1dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001600)={@dev}, &(0x7f0000001640)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000001680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000016c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000017c0)={{{@in, @in=@remote}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f00000018c0)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000002440), 0x0, 0x0, &(0x7f0000002500)={0x77359400}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002540)={0x0, @multicast2, @loopback}, &(0x7f0000002580)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f00000025c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002600)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000002640)={{{@in=@dev, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000002740)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002780)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000027c0)={{{@in=@rand_addr, @in6=@ipv4={[], [], @broadcast}}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002900)={{{@in6=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000002a00)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000002a40)={'vcan0\x00'}) 03:34:52 executing program 2: sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x10000200003) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4(r0, 0x0, &(0x7f0000da8ffc), 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000001c0)={0x0, @in6={{0x2, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x9]}}}, 0x0, 0x2000000000a6, 0x0, 0x0, 0x5}, 0x98) 03:34:52 executing program 0: r0 = add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f0000000200), 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040), 0x0, 0x0, r0) keyctl$search(0xa, r0, &(0x7f0000000080)='keyring\x00', &(0x7f00000001c0), r1) 03:34:52 executing program 5: clock_gettime(0xb, &(0x7f0000000040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000003580), 0x4000000000001ca, 0x0, &(0x7f0000000680)) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() inotify_init() shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") clock_gettime(0x0, &(0x7f0000000140)) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) syz_open_dev$dmmidi(&(0x7f00000003c0)='/dev/dmmidi#\x00', 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000400)=""/132, 0x84, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, &(0x7f0000000200)=0x1c, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000240), 0x4) pwritev(0xffffffffffffffff, &(0x7f0000000280), 0x0, 0x0) rt_sigtimedwait(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000180), 0x8) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000280)) 03:34:53 executing program 2: shmat(0x0, &(0x7f0000fee000/0x12000)=nil, 0x0) shmdt(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000005c0)=""/4096) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x0) dup(0xffffffffffffffff) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000140)) writev(0xffffffffffffffff, &(0x7f0000000200), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) accept4$unix(0xffffffffffffffff, &(0x7f0000000280)=@abs, &(0x7f0000000300)=0x6e, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000000240)=0xc) getsockname$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @rand_addr}, &(0x7f0000000200)=0x33e) utimes(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)={{0x77359400}, {0x0, 0x7530}}) keyctl$set_reqkey_keyring(0x7, 0x0) epoll_create1(0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000001700)={0x18}, 0x18) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f00000002c0)={@mcast1}, &(0x7f0000000300)=0x14) open(&(0x7f0000001740)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000001c0)) pread64(0xffffffffffffffff, &(0x7f0000000140)=""/114, 0x72, 0x0) clone(0x0, &(0x7f0000000300), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f00000012c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x0, &(0x7f0000000500), &(0x7f0000000080), &(0x7f0000000580), &(0x7f00000001c0)) pread64(0xffffffffffffffff, &(0x7f0000000040)=""/12, 0xc, 0x0) syz_execute_func(&(0x7f0000000380)="428055a072690169ef69dc00d9d969203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:34:53 executing program 0: clock_gettime(0xfffffffffffffffb, &(0x7f0000000000)) pipe(&(0x7f0000000d40)) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) chroot(&(0x7f0000000040)='./file0\x00') socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000340)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, &(0x7f00000001c0)={{}, 0x0, 0x0, 'id1\x00', 'timer1\x00'}) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0ad6969ef69dc00d99069203737c33bc481d8145200060f38792117172564a70f157a9e660f478431508c0000e5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cgroup.controllers\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000480)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000400)='3keyring\x00', 0xffffffffffffffff}, 0x30) getrlimit(0x0, &(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000380)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000500)={0x0, &(0x7f00000004c0)}) unshare(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net/if_inet6\x00') socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000280)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f00000000c0)) getitimer(0x0, &(0x7f0000000240)) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000300), &(0x7f0000000040)=0x4) time(&(0x7f0000000580)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)="76626f786e6574308400"}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='eth0cgroup(\x00'}, 0x10) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getresgid(&(0x7f0000000200), &(0x7f00000002c0), &(0x7f0000000340)) 03:34:53 executing program 3: mkdir(&(0x7f0000000200)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) syz_open_dev$mice(&(0x7f0000000540)='/dev/input/mice\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000007c0)='cpuset.effective_mems\x00', 0x0, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000800)={0x7}, 0x7) open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mknodat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f00000000c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x0) renameat(0xffffffffffffffff, &(0x7f00000002c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0xffffffffffffffff, &(0x7f0000000340)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00") perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet(0x10, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000009ff0)}, 0x0) add_key(&(0x7f0000000080)='id_legacy\x00', &(0x7f00000000c0), &(0x7f0000000140), 0x0, 0xfffffffffffffffb) clock_gettime(0x0, &(0x7f0000000600)) ppoll(&(0x7f00000005c0), 0x0, &(0x7f0000000640), &(0x7f0000000680), 0x8) add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f0000000700), 0x0, 0x0, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) clock_gettime(0x0, &(0x7f0000000740)) futimesat(0xffffffffffffffff, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000780)={{}, {0x77359400}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000002c0)={{{@in=@multicast1, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000240)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@mcast1, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4}}}, &(0x7f00000004c0)=0xe8) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000500)={0x0, 0x0, 0x0, &(0x7f0000000840)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000008c0)="42805da0510fef69dc0f01ee0dce41cbff91dd912a3d062900770f78993d233d2341a407e94dfa4dfa660f38302f450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:34:53 executing program 4: dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, &(0x7f00000000c0)) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f00000001c0)) alarm(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}, &(0x7f0000000280)=0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002c00)={{{@in6=@loopback, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000000)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002e00)={{{@in6=@mcast1, @in=@remote}}, {{@in=@broadcast}, 0x0, @in=@dev}}, &(0x7f0000002f00)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003080), &(0x7f00000030c0)=0xc) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f00000049c0)=0xffffffffffffff3c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004a00), &(0x7f0000004a40)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004a80)={{{@in6=@dev, @in6=@remote}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000004b80)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000006500)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006540)={{{@in6=@mcast1, @in6=@local}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000006640)=0xe8) gettid() getuid() getgid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000078c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000007900)={{{@in6, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000007a00)=0xe8) getresgid(&(0x7f0000007a40), &(0x7f0000007a80), &(0x7f0000007ac0)) getpgrp(0x0) getresuid(&(0x7f0000007b00), &(0x7f0000007b40), &(0x7f0000007b80)) fstat(0xffffffffffffffff, &(0x7f0000007bc0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000007c40)) getresuid(&(0x7f0000007c80), &(0x7f0000007cc0), &(0x7f0000007d00)) getegid() sendmsg$netlink(0xffffffffffffffff, &(0x7f0000007e00)={0x0, 0x0, &(0x7f0000007840), 0x0, &(0x7f0000007d40)}, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f0000000040), 0x0) prctl$setmm(0x23, 0x0, &(0x7f0000ff9000/0x4000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000002bc0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a06b6969ef69dc00d9901837c4c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:34:53 executing program 1: r0 = socket$kcm(0xa, 0x40122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000002c0), 0x4) sendmsg$kcm(r0, &(0x7f0000003840)={&(0x7f0000001600)=@un=@abs, 0x80, &(0x7f0000001680)=[{&(0x7f0000000140)="f4001100002b2c25e994efd18498d6623abaa68754a3ffffff8002000000000000000000000000003a00000000000000c00195c1e2d4f32ebdbed8285538dd308252644135333a847bbaeb4e914b976c5bb59d", 0x53}], 0x1}, 0x0) 03:34:53 executing program 1: prctl$setname(0xf, &(0x7f0000000440)='\b\x00\x00\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getpid() write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000300)={0x18}, 0x18) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f0000000940)=""/165) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000000c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)) get_robust_list(0x0, &(0x7f00000005c0)=&(0x7f0000000580)={&(0x7f00000004c0)={&(0x7f0000000200)}, 0x0, &(0x7f0000000540)={&(0x7f0000000500)}}, &(0x7f0000000600)=0x18) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) tkill(0x0, 0x0) sched_setparam(0x0, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000680)) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") open(&(0x7f0000000640)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a0ad6969ef4769dc00d9d9c481d8145200060f38c50b7a1717c4a3cd7dc4e37a9e660f478431508c0000e5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b75be2189fc4227992749f55") 03:34:53 executing program 5: personality(0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) getitimer(0x0, &(0x7f0000000600)) ustat(0x0, &(0x7f0000000280)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001ec0)='/dev/vga_arbiter\x00', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) clock_gettime(0x0, &(0x7f0000000240)) clock_gettime(0x0, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000000)={0x0, @loopback, @multicast1}, &(0x7f0000000640)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000680)={@mcast1}) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000080), 0x4) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) rt_sigtimedwait(&(0x7f0000000200), &(0x7f0000000240), &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000140)="42805da0690fef69dc0f01ee8141ff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:34:53 executing program 1: setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000200)={0x0, &(0x7f00000001c0)}, 0xfffffffffffffe89) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000480)='/dev/full\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f00000003c0)=0x4) sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x21200}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)=ANY=[@ANYBLOB="00052abd7000fddbdf250200000008000500000000001800020014000100ac1414bb000000000000000000000000080004000400000008000600ff7f00000c00030008000800a00000005c000300080005007f000001080001000000000008000500e0000002140002007663616e30000000000000000000000008000500e0000002140006000000000000000000000000000000000008000300000000000800080001000000"], 0x1}}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={r0, 0x28, &(0x7f0000000400)}, 0x10) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socket$packet(0x11, 0x3, 0x300) dup2(0xffffffffffffffff, 0xffffffffffffffff) [ 934.153237] device lo left promiscuous mode 03:34:54 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000bfcffc), &(0x7f0000000040)=0x4) 03:34:54 executing program 0: getrusage(0x1, &(0x7f0000000600)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000008c0)={{{@in=@dev, @in=@multicast1}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f00000009c0)=0xe8) lstat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004280)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x16, &(0x7f0000004240)='systemselinuxvboxnet0\x00'}, 0x30) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000042c0)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@local}}, &(0x7f00000043c0)=0xe8) getresgid(&(0x7f0000004400), &(0x7f0000004440), &(0x7f0000004480)) fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000004a00), &(0x7f0000004a40), &(0x7f0000004a80)) getgroups(0x0, &(0x7f0000004ac0)) getpid() lstat(&(0x7f0000004b00)='./file0\x00', &(0x7f0000004b40)) getgroups(0x0, &(0x7f0000004bc0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000006440)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0xa, &(0x7f0000006400)='attr/exec\x00'}, 0x30) lstat(&(0x7f0000006480)='./file0\x00', &(0x7f00000064c0)) fstat(0xffffffffffffffff, &(0x7f0000006540)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000065c0)) fstat(0xffffffffffffffff, &(0x7f0000006600)) getgid() fcntl$getown(0xffffffffffffffff, 0x9) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006680), &(0x7f00000066c0)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000006940)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006980)={{{@in=@loopback, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000006a80)=0xe8) getgid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000006ac0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006b00), &(0x7f0000006b40)=0xc) getresgid(&(0x7f0000006b80), &(0x7f0000006bc0), &(0x7f0000006c00)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000006c40)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006c80)={{{@in=@loopback, @in6=@mcast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@remote}}, &(0x7f0000006d80)=0xe8) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006dc0)) stat(&(0x7f0000006e00)='./file0\x00', &(0x7f0000006e40)) lstat(&(0x7f0000006ec0)='./file0\x00', &(0x7f0000006f00)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000009200), 0x0, 0x0) msync(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000280)) syz_open_procfs(0x0, &(0x7f0000000240)='attr/exec\x00') gettid() memfd_create(&(0x7f0000000200)='\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000080)="428055a06b6969ef69dc00d99069203737c3397c2a8e0f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e298262e6426f30f2b05090000003f") openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000dc0)="42804da0c60fef69dc330f0122cec273fe660fef74a409387c3667f9460738286a00f081768cc8000000c481b5e5bc2b00000021f3e12dba32047000000fed84210b000000cacad379dae5cfe5e56aac410f0fbd090000001ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:34:54 executing program 3: futex(&(0x7f00000002c0), 0x4, 0x0, &(0x7f0000000280)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000640)) seccomp(0x0, 0x0, &(0x7f0000000100)) setrlimit(0x0, &(0x7f0000000200)) syz_open_procfs(0x0, &(0x7f0000000380)='net/snmp6\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000880)={{{@in=@loopback, @in6=@loopback}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000980)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in=@local, @in=@local}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f0000000ac0)=0xe8) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000d00)={&(0x7f00000003c0), 0xc, &(0x7f0000000cc0)={&(0x7f0000000d40)=ANY=[]}}, 0x0) getpgrp(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)) eventfd(0x0) accept4$inet(0xffffffffffffff9c, &(0x7f0000000080)={0x2, 0x0, @remote}, &(0x7f0000000140)=0x10, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000780)='/dev/full\x00', 0x0, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000600)=""/24) syz_execute_func(&(0x7f0000000200)="42805da0320fef69dc0f01eece73fe19fa380f38211af3f242d2be00000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000500)={{{@in=@remote, @in=@remote}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0xe8) syz_execute_func(&(0x7f0000000400)="42805da0510f61e2db0595c3300dcececb9ee506158e7e0c91a33d062900770f78993d233d2341745f4a864a8680eb0a5f8dee39290fb2827d20c9c4a10dfbd6fee60f2e2121018f69d898b4c2b298220a31a3b7e2989d") [ 934.400064] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 03:34:54 executing program 4: keyctl$set_reqkey_keyring(0x14, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$amidi(&(0x7f0000000280)='/dev/amidi#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000440)="42805da06b0fef69dc0f01eece41ff0f7f7f37370f38211ac4c19086d9f28fc9410feefa6b2179f3afe541cda045458978836809000000010d64ac1e5d31a3b7c44379dfb9d6add190dfe2989f7f") [ 934.448676] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 03:34:54 executing program 2: keyctl$set_reqkey_keyring(0x7, 0xfffffffb) pipe(&(0x7f0000000480)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000140)) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x1000, &(0x7f00000002c0), &(0x7f00000003c0)=""/4096}, 0x28) write$P9_RFLUSH(0xffffffffffffffff, &(0x7f0000000100)={0x7}, 0x7) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:34:54 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000002c0)={0x30, 0x5, 0x0, {0x0, 0x0, 0x0, 0x6}}, 0x30) sendto$inet6(r0, &(0x7f0000e77fff), 0x2bd, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000240)='nv\x00', 0x3) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), &(0x7f0000000100)}}, &(0x7f0000000200)) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x0, 0x0, {0x1f}}, 0x18) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000004f000/0x18000)=nil, &(0x7f0000000180)=[@text64={0x40, &(0x7f0000000100)="26410f300f01c90f06643e400f01c9420f758e000000002ef3400fb8e566baf80cb8ac8abd80ef66bafc0cedd2fe0f01ca66ba4000ec", 0x36}], 0x1, 0x0, &(0x7f00000001c0), 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@textreal={0x8, &(0x7f0000000240)="ba4300b00bee0f017edaf02114650f1ea7f07f0f20e06635040000000f22e03e0fc72dbaf80c66b80fb2578d66efbafc0cb001ee0fc75ba2f40f3805800060", 0x3f}], 0x0, 0x0, &(0x7f0000000140), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000002000/0x18000)=nil, &(0x7f0000000200)=[@textreal={0x8, &(0x7f00000001c0)="0f0f280dbaf80c66b8561eac8666efbafc0cecd8d80f01720cbad10466ed26900f019d848066b92902000066b80800000066ba000000000f300f01d10f013b", 0x3f}], 0x1, 0x0, &(0x7f0000000300), 0x0) ioctl$KVM_X86_SETUP_MCE(r4, 0x4008ae9c, &(0x7f0000000280)={0x8, 0x1}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000140)={0x0, 0x4, 0xffffffffffffff6d, 0x1, 0x0, 0x0, 0x7fffffff, 0x6, {0x0, @in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x165, 0x0, 0x101}}, &(0x7f0000000200)=0xb0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000280)={0x2, 0x8000, 0x7, 0x0, 0x0, 0x0, 0x0, 0xca}, 0x20) ftruncate(r6, 0x7fff) sendfile(r1, r6, &(0x7f0000d83ff8), 0x8000fffffffe) fcntl$F_GET_FILE_RW_HINT(r5, 0x40d, &(0x7f0000000000)) 03:34:54 executing program 5: syz_emit_ethernet(0x1c0, &(0x7f0000000140)={@random="f1cec3281d34", @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @multicast1}, @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "bea295", 0x0, "d20434"}}}}}}, &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000003c0)=""/59, 0xffffffffffffff44, 0x0, 0x0, 0x2d2) delete_module(&(0x7f0000000040)='(}\x00', 0x0) pipe(&(0x7f0000000080)) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast2, @in=@local}}, {{@in6=@mcast1}, 0x0, @in=@loopback}}, &(0x7f0000000540)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:34:54 executing program 3: keyctl$dh_compute(0xc, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") timerfd_create(0x0, 0x0) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") [ 934.756566] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 934.757752] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 03:34:54 executing program 1: setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000200)={0x0, &(0x7f00000001c0)}, 0xfffffffffffffe89) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000480)='/dev/full\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f00000003c0)=0x4) sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x21200}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)=ANY=[@ANYBLOB="00052abd7000fddbdf250200000008000500000000001800020014000100ac1414bb000000000000000000000000080004000400000008000600ff7f00000c00030008000800a00000005c000300080005007f000001080001000000000008000500e0000002140002007663616e30000000000000000000000008000500e0000002140006000000000000000000000000000000000008000300000000000800080001000000"], 0x1}}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={r0, 0x28, &(0x7f0000000400)}, 0x10) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socket$packet(0x11, 0x3, 0x300) dup2(0xffffffffffffffff, 0xffffffffffffffff) 03:34:54 executing program 3: mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mknod$loop(&(0x7f00000002c0)='./file0\x00', 0x0, 0xffffffffffffffff) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000640)=0xc) gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@remote, @in=@dev}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f0000000b00)=0xe8) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000000b80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c00), &(0x7f0000000c40)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000d80)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@ipv4={[], [], @dev}, @in=@local}}, {{@in=@rand_addr}, 0x0, @in6=@local}}, &(0x7f0000000ec0)=0xe8) lstat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000025c0), &(0x7f0000002600)=0xc) getgroups(0x0, &(0x7f0000002640)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002680)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000026c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in=@loopback}}}, &(0x7f00000027c0)=0xe8) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002800)) fstat(0xffffffffffffffff, &(0x7f0000002840)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000028c0), &(0x7f0000002900)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002940)) stat(&(0x7f0000002980)='./file0\x00', &(0x7f00000029c0)) fstat(0xffffffffffffffff, &(0x7f0000002a40)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002bc0)={&(0x7f00000001c0), 0xc, &(0x7f0000000d40), 0x0, &(0x7f0000002ac0)}, 0x0) mknod(&(0x7f00007f2ff8)='./file0\x00', 0x0, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000380)) sendmmsg(0xffffffffffffffff, &(0x7f0000000800), 0x0, 0x0) open(&(0x7f00007ddff8)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000980)={&(0x7f0000000880), 0xc, &(0x7f0000000940)={&(0x7f0000000900)={0x14}, 0x14}}, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000004c0), &(0x7f0000000840)=0x4) ioctl$KDGKBLED(0xffffffffffffffff, 0xc0189436, &(0x7f0000000fff)) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01ee0dce41ff0fc4a33d062900370f38211ac4410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b770989f7f") openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000240)) write$cgroup_type(0xffffffffffffffff, &(0x7f00000009c0)='threaded\x00', 0x9) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) [ 935.138631] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 03:34:55 executing program 1: setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000200)={0x0, &(0x7f00000001c0)}, 0xfffffffffffffe89) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000480)='/dev/full\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f00000003c0)=0x4) sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x21200}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)=ANY=[@ANYBLOB="00052abd7000fddbdf250200000008000500000000001800020014000100ac1414bb000000000000000000000000080004000400000008000600ff7f00000c00030008000800a00000005c000300080005007f000001080001000000000008000500e0000002140002007663616e30000000000000000000000008000500e0000002140006000000000000000000000000000000000008000300000000000800080001000000"], 0x1}}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={r0, 0x28, &(0x7f0000000400)}, 0x10) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socket$packet(0x11, 0x3, 0x300) dup2(0xffffffffffffffff, 0xffffffffffffffff) 03:34:55 executing program 0: keyctl$set_reqkey_keyring(0x7, 0xfffffffc) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@mcast1}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000080)=0xdf) open(&(0x7f00000006c0)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000bc0)='nbd\x00') syz_open_dev$dspn(&(0x7f0000000c00)='/dev/dsp#\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000c40)='/dev/input/mice\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000c80)='./file0\x00', 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/vsock\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000d00)='/dev/usbmon#\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0) syz_open_dev$midi(&(0x7f0000002240)='/dev/midi#\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000002280)='/dev/sequencer\x00', 0x0, 0x0) syz_open_dev$usb(&(0x7f00000022c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) syz_open_dev$admmidi(&(0x7f0000002300)='/dev/admmidi#\x00', 0x0, 0x0) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000002480)={&(0x7f0000000700), 0xc, &(0x7f0000002440)={&(0x7f0000002340)={0x14}, 0x14}}, 0x0) getegid() socket$inet6_dccp(0xa, 0x6, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000007c0)=@filter={'filter\x00', 0xe, 0x4, 0x3a0, 0x340, 0xf0, 0x1e0, 0x0, 0xf0, 0x340, 0x340, 0x340, 0x340, 0x340, 0x4, &(0x7f0000000600), {[{{@uncond, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@local, @remote, [], [], 'ip6tnl0\x00', 'bond0\x00'}, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@local, @dev, [], [], 'veth1_to_bond\x00', 'bond_slave_0\x00'}, 0x0, 0xc8, 0xf0}, @common=@unspec=@STANDARD={0x28}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x400) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000000c0)=0xe8) getgid() getuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xfffffffffffffff9) openat$null(0xffffffffffffff9c, &(0x7f0000000640)='/dev/null\x00', 0x0, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000680)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, 0xffffffffffffffff) 03:34:55 executing program 4: add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0), &(0x7f00000002c0)="13", 0x1, 0xfffffffffffffffe) keyctl$get_keyring_id(0x0, 0x0, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) prctl$intptr(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)) syz_execute_func(&(0x7f0000000240)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") [ 935.723092] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 03:34:55 executing program 2: madvise(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) pipe2(&(0x7f00000003c0), 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000005c0), 0xc, &(0x7f00000007c0)={&(0x7f00000001c0)=ANY=[]}}, 0x0) restart_syscall() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@empty, @local, @dev}, &(0x7f0000000180)=0xc) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) memfd_create(&(0x7f00000001c0)='.\x00', 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000200)) rt_sigpending(&(0x7f0000000080), 0x8) socket$inet6(0xa, 0x0, 0x0) io_setup(0x0, &(0x7f0000000240)) syz_genetlink_get_family_id$team(&(0x7f0000000440)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000940)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001280)={{{@in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f0000001380)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000013c0)={{{@in6=@local, @in6=@mcast2}}, {{@in6}}}, &(0x7f00000014c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001540)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001580)={@broadcast, @broadcast}, &(0x7f00000015c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c00)={{{@in=@loopback, @in=@dev}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@remote}}, &(0x7f0000000a80)=0xffffffffffffff1b) accept4$packet(0xffffffffffffffff, &(0x7f0000001740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001780)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000880)={@local, @dev}, &(0x7f0000000a40)=0x6d0fa773ca4a6d0a) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001840)={0x0, @loopback, @multicast1}, &(0x7f0000001880)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000018c0)={0x0, @remote, @rand_addr}, &(0x7f0000001900)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001980)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002100)={@rand_addr}, &(0x7f0000002140)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002600)={0x0, @multicast1}, &(0x7f0000002640)=0xc) accept4(0xffffffffffffffff, &(0x7f0000004300)=@can, &(0x7f0000004380)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f000000ad00), 0x0, 0x0, &(0x7f000000aec0)={0x0, 0x989680}) getpeername(0xffffffffffffffff, &(0x7f000000af00)=@xdp, &(0x7f000000af80)=0x80) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000b00)={{{@in=@dev, @in6=@dev}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xfffffffffffffe99) recvmsg(0xffffffffffffffff, &(0x7f000000c540)={&(0x7f000000b300)=@hci, 0x80, &(0x7f000000c440), 0x0, &(0x7f000000c480)=""/151, 0x97}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f000000c640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000c680)=0x14) accept4(0xffffffffffffffff, &(0x7f000000e080)=@xdp, &(0x7f000000e100)=0x80, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000e140)={@empty, @multicast2}, &(0x7f000000e180)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000e1c0)={{{@in=@loopback, @in6=@loopback}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@mcast1}}, &(0x7f000000e2c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000e300)={{{@in=@multicast2, @in=@remote}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f000000e400)=0xe8) syz_execute_func(&(0x7f0000000d80)="428055a08f6969ef69dc00d9c4e17911466fc841ff0f1837c4c3397c2a060f38211a40a5819086d9f28fc9410feee50f50e67545c421a22a04a00f2e1a1a0126460fe4e731a3b786e2989f7f") 03:34:55 executing program 5: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) rt_sigqueueinfo(r1, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffff9}) ptrace$getsig(0x4202, r1, 0x0, &(0x7f0000000040)) [ 935.753746] audit: type=1326 audit(2000000095.604:62): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=26455 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:34:55 executing program 5: getitimer(0x0, &(0x7f0000000180)) socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 03:34:55 executing program 1: setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000200)={0x0, &(0x7f00000001c0)}, 0xfffffffffffffe89) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000480)='/dev/full\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f00000003c0)=0x4) sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x21200}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)=ANY=[@ANYBLOB="00052abd7000fddbdf250200000008000500000000001800020014000100ac1414bb000000000000000000000000080004000400000008000600ff7f00000c00030008000800a00000005c000300080005007f000001080001000000000008000500e0000002140002007663616e30000000000000000000000008000500e0000002140006000000000000000000000000000000000008000300000000000800080001000000"], 0x1}}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={r0, 0x28, &(0x7f0000000400)}, 0x10) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socket$packet(0x11, 0x3, 0x300) dup2(0xffffffffffffffff, 0xffffffffffffffff) [ 936.222316] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 03:34:56 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000000080)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000180)="1f0000000203193b000007000000068100023b050900020000004000030058", 0x1f}], 0x1) 03:34:56 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000300)={&(0x7f0000000080), 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv6_newaddr={0x2c, 0x14, 0x111, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @loopback}]}, 0x2c}}, 0x0) [ 936.564223] audit: type=1326 audit(2000000096.414:63): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=26455 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:34:56 executing program 4: keyctl$set_reqkey_keyring(0x15, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f00000000c0)) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000040)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x0, 0x0) delete_module(&(0x7f0000000400)="292c65762d766d6e6574382100b20c754beb04c44ff2d9d54b946d37870ab4967063d903f3438084a8e25e0b45b495748a928c5898cb880454506aa6ca7e8eec076a199ed290017dd435defc3c9b562580d922ae06192d5ca5b15b0018ee3ef62560d7358afd4be83d8e181f3a44121774a1e026a0f3f270fa5ee032a956a00ff00c12c4", 0x0) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000280)) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000002c0)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in, @in=@broadcast}}, {{@in=@broadcast}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getuid() getresgid(&(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000700)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0xc) lstat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)) getuid() lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) lstat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)) syz_execute_func(&(0x7f0000000680)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc7397c2a0f0fcdae300f38211a40a5c441657538c48391683f000f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:34:56 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x13, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2, 0x25}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 03:34:57 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000200)='/dev/usbmon#\x00', 0x0, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dsp\x00', 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0), 0xfffffffffffffed3) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x14) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000000240)=ANY=[@ANYBLOB="7a0af8ff75256400bfa100000000000007010000f8ffffffb702000004000000bf130000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) socketpair(0x0, 0x0, 0x80, &(0x7f0000000440)) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0xf}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x8000a0, 0xe, 0x85, &(0x7f0000000180)="00000074000000000000000039e4", &(0x7f0000000340)=""/133, 0x429}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0x50, &(0x7f0000000480)}, 0x10) 03:34:57 executing program 1: keyctl$set_reqkey_keyring(0x10, 0x5) syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x0, 0x0) msgget$private(0x0, 0x0) msgsnd(0x0, &(0x7f0000000100), 0x8, 0x0) socket$inet6_icmp_raw(0x2, 0x3, 0x3a) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000080)) lstat(0xffffffffffffffff, &(0x7f0000000440)) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001540), &(0x7f0000001580)=0xc) getgroups(0x4000000000000018, &(0x7f00000015c0)) getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000017c0)={{{@in, @in6=@dev}}, {{@in6=@mcast1}, 0x0, @in=@loopback}}, &(0x7f00000018c0)=0xe8) stat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)) fcntl$getown(0xffffffffffffffff, 0x9) geteuid() stat(&(0x7f0000003300)='./file0\x00', &(0x7f0000003340)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000033c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003400)={{{@in6=@remote, @in6=@ipv4={[], [], @remote}}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000003500)=0xe8) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003580)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000003540)='/dev/dsp#\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000035c0)={{{@in6=@loopback, @in=@dev}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000036c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000003700)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003ac0)) geteuid() getresgid(&(0x7f0000003b00), &(0x7f0000003b40), &(0x7f0000003b80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003bc0), &(0x7f0000003c00)=0xc) getresuid(&(0x7f0000003c40), &(0x7f0000003c80), &(0x7f0000003cc0)) 03:34:57 executing program 0: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x76, &(0x7f0000000140)={r1, @in={{0x2, 0x0, @remote}}}, &(0x7f0000000000)=0x84) 03:34:57 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000003c0)={0x14, 0x0, &(0x7f0000000680)=[@acquire_done], 0x0, 0x0, &(0x7f0000000180)}) [ 937.652234] binder: 26512:26516 BC_ACQUIRE_DONE node 14 has no pending acquire request [ 937.694696] binder: BINDER_SET_CONTEXT_MGR already set [ 937.700210] binder: 26512:26516 ioctl 40046207 0 returned -16 [ 937.733705] binder: 26512:26520 BC_ACQUIRE_DONE u0000000000000000 no match 03:34:57 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000200)='/dev/usbmon#\x00', 0x0, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dsp\x00', 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0), 0xfffffffffffffed3) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x14) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000000240)=ANY=[@ANYBLOB="7a0af8ff75256400bfa100000000000007010000f8ffffffb702000004000000bf130000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) socketpair(0x0, 0x0, 0x80, &(0x7f0000000440)) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0xf}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x8000a0, 0xe, 0x85, &(0x7f0000000180)="00000074000000000000000039e4", &(0x7f0000000340)=""/133, 0x429}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0x50, &(0x7f0000000480)}, 0x10) 03:34:57 executing program 0: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000200)=0x949, 0x1b) fcntl$setstatus(r0, 0x4, 0x42000) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x40000000000001c, 0x0) 03:34:57 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0xc) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000480)={0x20080522, r1}, &(0x7f00000004c0)) 03:34:57 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000200)='/dev/usbmon#\x00', 0x0, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dsp\x00', 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0), 0xfffffffffffffed3) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x14) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000000240)=ANY=[@ANYBLOB="7a0af8ff75256400bfa100000000000007010000f8ffffffb702000004000000bf130000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) socketpair(0x0, 0x0, 0x80, &(0x7f0000000440)) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0xf}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x8000a0, 0xe, 0x85, &(0x7f0000000180)="00000074000000000000000039e4", &(0x7f0000000340)=""/133, 0x429}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0x50, &(0x7f0000000480)}, 0x10) 03:34:58 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0xfffffffffffffdd1, 0x0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0xfffffffffffffdc1) creat(&(0x7f0000000700)='./bus\x00', 0x0) creat(&(0x7f00000003c0)='./bus\x00', 0x0) gettid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000001c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000200)=']\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000480)) getpgrp(0x0) getpgrp(0x0) getpgrp(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f0000000300)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) getpgrp(0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) gettid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000002c0)) getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001cc0)={{{@in6=@dev, @in6=@dev}}, {{}, 0x0, @in6}}, &(0x7f0000001dc0)=0xe8) getgroups(0x0, &(0x7f0000001e00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000340)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a06b6969ef69dc00d990cc69203637c339392a061f40a8a5a8a541dfe0400f01ef7d0f2e1a1a01460f36660fd3600931a3b786e2989fc46178ae579b") stat(&(0x7f0000001e80)='./file0\x00', &(0x7f0000001ec0)) stat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)) getpgid(0x0) geteuid() getegid() readlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x0) geteuid() getgid() getpid() getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000026c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002700)={{{@in=@multicast1, @in=@remote}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000002800)=0xe8) getgroups(0x0, &(0x7f0000000200)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003200)={{{@in=@remote, @in=@multicast1}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000005700)=0xe8) getresgid(&(0x7f0000003340), &(0x7f0000003380), &(0x7f00000033c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003440)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6}}, &(0x7f0000003540)=0xe8) 03:34:58 executing program 4: pipe(&(0x7f0000000040)) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x4}, 0x58) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000340)) gettid() getpid() fstat(0xffffffffffffffff, &(0x7f0000000400)) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@loopback, @in=@loopback}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000000900)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) getresuid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000c40)) getgroups(0x0, &(0x7f0000000c80)) fstat(0xffffffffffffffff, &(0x7f0000000cc0)) getresgid(&(0x7f0000000d40), &(0x7f0000000d80), &(0x7f0000000dc0)) getuid() getgroups(0x0, &(0x7f0000001080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000010c0), &(0x7f0000001200)=0xc) stat(&(0x7f0000001240)='./file0\x00', &(0x7f0000001280)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001400)={{{@in=@rand_addr, @in=@dev}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001500)=0xe8) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002980)={{{@in6=@loopback, @in6=@local}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000002a80)=0xe8) getegid() getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002b40)={{{@in6=@dev, @in6}}, {{@in6}}}, &(0x7f0000002c40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002d00), &(0x7f0000002d40)=0xc) geteuid() fstat(0xffffffffffffffff, &(0x7f0000002d80)) lstat(&(0x7f0000005380)='./file0\x00', &(0x7f00000053c0)) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005440)={{{@in6, @in6}}, {{@in=@local}, 0x0, @in=@multicast1}}, &(0x7f0000005540)=0xe8) getresgid(&(0x7f0000005580), &(0x7f00000055c0), &(0x7f0000005600)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005640)={{{@in6=@remote, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000005740)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005780), &(0x7f00000057c0)=0xc) getgroups(0x0, &(0x7f0000005800)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005840)={{{@in=@multicast1, @in6}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, &(0x7f0000005940)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000005980)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005b00), 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000007c0)) stat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000540), 0x0, &(0x7f0000000600)}, 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000001100)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000005c0)='cgroup.type\x00', 0x2, 0x0) syz_execute_func(&(0x7f0000000140)="42805da0320fef69dc0f01eece73fe19fa380f38211af3f242d2be00000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:34:58 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000200)='/dev/usbmon#\x00', 0x0, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dsp\x00', 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0), 0xfffffffffffffed3) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x14) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000000240)=ANY=[@ANYBLOB="7a0af8ff75256400bfa100000000000007010000f8ffffffb702000004000000bf130000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) socketpair(0x0, 0x0, 0x80, &(0x7f0000000440)) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0xf}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x8000a0, 0xe, 0x85, &(0x7f0000000180)="00000074000000000000000039e4", &(0x7f0000000340)=""/133, 0x429}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0x50, &(0x7f0000000480)}, 0x10) 03:34:58 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000200)='/dev/usbmon#\x00', 0x0, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dsp\x00', 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0), 0xfffffffffffffed3) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x14) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000000240)=ANY=[@ANYBLOB="7a0af8ff75256400bfa100000000000007010000f8ffffffb702000004000000bf130000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) socketpair(0x0, 0x0, 0x80, &(0x7f0000000440)) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0xf}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x8000a0, 0xe, 0x85, &(0x7f0000000180)="00000074000000000000000039e4", &(0x7f0000000340)=""/133, 0x429}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0x50, &(0x7f0000000480)}, 0x10) 03:34:58 executing program 1: clock_adjtime(0x0, &(0x7f00000004c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:34:58 executing program 0: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000200)=0x949, 0x1b) fcntl$setstatus(r0, 0x4, 0x42000) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x40000000000001c, 0x0) 03:34:58 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000200)='/dev/usbmon#\x00', 0x0, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dsp\x00', 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0), 0xfffffffffffffed3) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x14) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000000240)=ANY=[@ANYBLOB="7a0af8ff75256400bfa100000000000007010000f8ffffffb702000004000000bf130000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) socketpair(0x0, 0x0, 0x80, &(0x7f0000000440)) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0xf}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x8000a0, 0xe, 0x85, &(0x7f0000000180)="00000074000000000000000039e4", &(0x7f0000000340)=""/133, 0x429}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0x50, &(0x7f0000000480)}, 0x10) 03:34:58 executing program 0: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000200)=0x949, 0x1b) fcntl$setstatus(r0, 0x4, 0x42000) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x40000000000001c, 0x0) 03:34:58 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000200)='/dev/usbmon#\x00', 0x0, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dsp\x00', 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0), 0xfffffffffffffed3) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x14) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000000240)=ANY=[@ANYBLOB="7a0af8ff75256400bfa100000000000007010000f8ffffffb702000004000000bf130000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) socketpair(0x0, 0x0, 0x80, &(0x7f0000000440)) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0xf}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x8000a0, 0xe, 0x85, &(0x7f0000000180)="00000074000000000000000039e4", &(0x7f0000000340)=""/133, 0x429}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0x50, &(0x7f0000000480)}, 0x10) 03:34:59 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0xfffffffffffffdd1, 0x0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0xfffffffffffffdc1) creat(&(0x7f0000000700)='./bus\x00', 0x0) creat(&(0x7f00000003c0)='./bus\x00', 0x0) gettid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000001c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000200)=']\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000480)) getpgrp(0x0) getpgrp(0x0) getpgrp(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f0000000300)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) getpgrp(0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) gettid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000002c0)) getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001cc0)={{{@in6=@dev, @in6=@dev}}, {{}, 0x0, @in6}}, &(0x7f0000001dc0)=0xe8) getgroups(0x0, &(0x7f0000001e00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000340)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a06b6969ef69dc00d990cc69203637c339392a061f40a8a5a8a541dfe0400f01ef7d0f2e1a1a01460f36660fd3600931a3b786e2989fc46178ae579b") stat(&(0x7f0000001e80)='./file0\x00', &(0x7f0000001ec0)) stat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)) getpgid(0x0) geteuid() getegid() readlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x0) geteuid() getgid() getpid() getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000026c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002700)={{{@in=@multicast1, @in=@remote}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000002800)=0xe8) getgroups(0x0, &(0x7f0000000200)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003200)={{{@in=@remote, @in=@multicast1}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000005700)=0xe8) getresgid(&(0x7f0000003340), &(0x7f0000003380), &(0x7f00000033c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003440)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6}}, &(0x7f0000003540)=0xe8) 03:34:59 executing program 0: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000200)=0x949, 0x1b) fcntl$setstatus(r0, 0x4, 0x42000) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x40000000000001c, 0x0) 03:34:59 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0xfffffffffffffdd1, 0x0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0xfffffffffffffdc1) creat(&(0x7f0000000700)='./bus\x00', 0x0) creat(&(0x7f00000003c0)='./bus\x00', 0x0) gettid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000001c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000200)=']\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000480)) getpgrp(0x0) getpgrp(0x0) getpgrp(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f0000000300)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) getpgrp(0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) gettid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000002c0)) getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001cc0)={{{@in6=@dev, @in6=@dev}}, {{}, 0x0, @in6}}, &(0x7f0000001dc0)=0xe8) getgroups(0x0, &(0x7f0000001e00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000340)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a06b6969ef69dc00d990cc69203637c339392a061f40a8a5a8a541dfe0400f01ef7d0f2e1a1a01460f36660fd3600931a3b786e2989fc46178ae579b") stat(&(0x7f0000001e80)='./file0\x00', &(0x7f0000001ec0)) stat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)) getpgid(0x0) geteuid() getegid() readlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x0) geteuid() getgid() getpid() getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000026c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002700)={{{@in=@multicast1, @in=@remote}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000002800)=0xe8) getgroups(0x0, &(0x7f0000000200)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003200)={{{@in=@remote, @in=@multicast1}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000005700)=0xe8) getresgid(&(0x7f0000003340), &(0x7f0000003380), &(0x7f00000033c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003440)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6}}, &(0x7f0000003540)=0xe8) 03:34:59 executing program 2: mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) eventfd(0x0) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:00 executing program 1: io_setup(0x2, &(0x7f0000000040)) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") syz_extract_tcp_res(&(0x7f00000002c0), 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) accept4$unix(0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000280)=0x6e, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000300)) accept4$packet(0xffffffffffffff9c, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000005c0)) getuid() stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000006c0)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) getresuid(&(0x7f0000000900), &(0x7f0000000940), &(0x7f0000000980)) getgid() getpgrp(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in6=@loopback, @in6=@local}}, {{@in=@remote}, 0x0, @in=@broadcast}}, &(0x7f0000000e00)=0xe8) getgroups(0x0, &(0x7f0000000e40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000e80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ec0)={{{@in6, @in6=@dev}}, {{@in6}, 0x0, @in=@local}}, &(0x7f0000000fc0)=0xe8) lstat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) getpgrp(0x0) stat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000000340)) getgroups(0x0, &(0x7f0000001180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001940)) lstat(&(0x7f0000001980)='./file0\x00', &(0x7f00000019c0)) stat(&(0x7f0000001a40)='./file0\x00', &(0x7f0000001a80)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001b00)=0xffffffffffffffff, 0x4) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001b40)={{{@in6=@loopback, @in6}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6=@local}}, &(0x7f0000001c40)=0xe8) lstat(&(0x7f0000001c80)='./file0\x00', &(0x7f0000001cc0)) gettid() getresuid(&(0x7f0000001d80), &(0x7f0000001dc0), &(0x7f0000001e00)) fstat(0xffffffffffffffff, &(0x7f0000001e40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002480), &(0x7f0000000080)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002500)={{{@in=@dev, @in6=@remote}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000002600)=0xe8) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002640), &(0x7f0000002680)=0xc) geteuid() lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d80)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003dc0)={{{@in=@dev, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000003ec0)=0xe8) getegid() gettid() stat(&(0x7f0000003f00)='./file0\x00', &(0x7f0000003f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003fc0), &(0x7f0000004000)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004040)) stat(&(0x7f0000004080)='./file0\x00', &(0x7f00000040c0)) fstat(0xffffffffffffffff, &(0x7f0000004140)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004200)={{{@in, @in=@remote}}, {{@in=@broadcast}, 0x0, @in=@dev}}, &(0x7f0000004300)=0xe8) getegid() 03:35:00 executing program 4: getpid() openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.swap.current\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") socket$nl_generic(0x10, 0x3, 0x10) sysfs$2(0x2, 0x0, &(0x7f0000000200)=""/47) gettid() sched_rr_get_interval(0x0, &(0x7f0000000140)) clock_getres(0x0, &(0x7f0000000400)) eventfd(0x0) fchdir(0xffffffffffffffff) syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x0, 0x0) ioctl$PPPIOCSMRU(0xffffffffffffffff, 0x40047452, &(0x7f0000000080)) dup(0xffffffffffffffff) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000240)) fstat(0xffffffffffffffff, &(0x7f0000000340)) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)) syz_execute_func(&(0x7f0000000780)="42805da0520fef84dc0f01eece67f3406e660c541af3f081768cc8000000df690067f00fbab204000000cac4e1057668d55cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 03:35:00 executing program 0: prctl$setname(0x18, &(0x7f0000000380)='/dev/midi#\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000700)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefac462fd1e28a676e541b87545d745d71ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f2ab7f") futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$nl_netfilter(0x10, 0x3, 0xc) openat$dir(0xffffffffffffff9c, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0) getpgrp(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000180)) prctl$setendian(0x14, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000380)) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000001340)=ANY=[]) socketpair(0x0, 0x0, 0x0, &(0x7f00000002c0)) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f00000003c0)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000200), 0x4) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f00000001c0)) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fb4175450f2e1a67f20f2cedc4a1c173dfdcf08024030842ec4b") syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000540)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000005c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000000680)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b80)={{{@in=@multicast1, @in=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000c80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000cc0)={0x0, @rand_addr, @loopback}, &(0x7f0000000d00)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000000d80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000dc0)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000e00)={{{@in=@rand_addr, @in=@multicast2}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000f00)=0xe8) accept(0xffffffffffffffff, &(0x7f0000000f40)=@hci, &(0x7f0000000fc0)=0x80) getsockname(0xffffffffffffffff, &(0x7f0000001000)=@can, &(0x7f0000001080)=0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000010c0)={'veth0_to_team\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f00000011c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001200)=0x14, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002380)={&(0x7f0000001240)=@xdp, 0x80, &(0x7f0000001340), 0x0, &(0x7f0000001380)=""/4096, 0x1000}, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000023c0)={@broadcast, @rand_addr}, &(0x7f0000002400)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000003a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003ac0)=0x14, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000003b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000003b40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000003b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003bc0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003c00)={{{@in6=@mcast2, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@remote}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000003d00)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003d40)={{{@in6=@dev, @in=@local}}, {{}, 0x0, @in6=@ipv4={[], [], @rand_addr}}}, &(0x7f0000003e40)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003f40)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@mcast1}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000004040)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000004080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000040c0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000004100)={'syzkaller1\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000004140)={@mcast1}, &(0x7f0000004180)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000041c0)={{{@in6=@local, @in6=@dev}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f00000042c0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000004300)={@broadcast, @rand_addr}, &(0x7f0000004340)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002440)={{{@in6=@dev, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000001140)=0xfffffffffffffd77) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000073c0)={{{@in=@multicast2, @in=@local}}, {{@in=@dev}}}, &(0x7f00000074c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000075c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000007600)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007640)={{{@in=@multicast2, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000007740)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007780)={{{@in=@dev, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in6=@dev}}, &(0x7f0000007880)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000078c0)={{{@in=@loopback}}, {{}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f00000079c0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000007a00)={'gre0\x00'}) 03:35:00 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0xfffffffffffffdd1, 0x0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0xfffffffffffffdc1) creat(&(0x7f0000000700)='./bus\x00', 0x0) creat(&(0x7f00000003c0)='./bus\x00', 0x0) gettid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000001c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000200)=']\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000480)) getpgrp(0x0) getpgrp(0x0) getpgrp(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f0000000300)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) getpgrp(0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) gettid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000002c0)) getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001cc0)={{{@in6=@dev, @in6=@dev}}, {{}, 0x0, @in6}}, &(0x7f0000001dc0)=0xe8) getgroups(0x0, &(0x7f0000001e00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000340)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a06b6969ef69dc00d990cc69203637c339392a061f40a8a5a8a541dfe0400f01ef7d0f2e1a1a01460f36660fd3600931a3b786e2989fc46178ae579b") stat(&(0x7f0000001e80)='./file0\x00', &(0x7f0000001ec0)) stat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)) getpgid(0x0) geteuid() getegid() readlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x0) geteuid() getgid() getpid() getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000026c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002700)={{{@in=@multicast1, @in=@remote}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000002800)=0xe8) getgroups(0x0, &(0x7f0000000200)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003200)={{{@in=@remote, @in=@multicast1}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000005700)=0xe8) getresgid(&(0x7f0000003340), &(0x7f0000003380), &(0x7f00000033c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003440)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6}}, &(0x7f0000003540)=0xe8) 03:35:00 executing program 2: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@random="75f5b720794f", @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @multicast1}, @igmp}}}}, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$packet(0x11, 0x0, 0x300) accept(0xffffffffffffffff, &(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, &(0x7f0000000500)=0x80) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:35:00 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0xfffffffffffffdd1, 0x0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0xfffffffffffffdc1) creat(&(0x7f0000000700)='./bus\x00', 0x0) creat(&(0x7f00000003c0)='./bus\x00', 0x0) gettid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000001c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000200)=']\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000480)) getpgrp(0x0) getpgrp(0x0) getpgrp(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f0000000300)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) getpgrp(0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) gettid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000002c0)) getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001cc0)={{{@in6=@dev, @in6=@dev}}, {{}, 0x0, @in6}}, &(0x7f0000001dc0)=0xe8) getgroups(0x0, &(0x7f0000001e00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000340)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a06b6969ef69dc00d990cc69203637c339392a061f40a8a5a8a541dfe0400f01ef7d0f2e1a1a01460f36660fd3600931a3b786e2989fc46178ae579b") stat(&(0x7f0000001e80)='./file0\x00', &(0x7f0000001ec0)) stat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)) getpgid(0x0) geteuid() getegid() readlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x0) geteuid() getgid() getpid() getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000026c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002700)={{{@in=@multicast1, @in=@remote}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000002800)=0xe8) getgroups(0x0, &(0x7f0000000200)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003200)={{{@in=@remote, @in=@multicast1}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000005700)=0xe8) getresgid(&(0x7f0000003340), &(0x7f0000003380), &(0x7f00000033c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003440)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6}}, &(0x7f0000003540)=0xe8) 03:35:00 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0xfffffffffffffdd1, 0x0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0xfffffffffffffdc1) creat(&(0x7f0000000700)='./bus\x00', 0x0) creat(&(0x7f00000003c0)='./bus\x00', 0x0) gettid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000001c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000200)=']\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000480)) getpgrp(0x0) getpgrp(0x0) getpgrp(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f0000000300)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) getpgrp(0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) gettid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000002c0)) getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001cc0)={{{@in6=@dev, @in6=@dev}}, {{}, 0x0, @in6}}, &(0x7f0000001dc0)=0xe8) getgroups(0x0, &(0x7f0000001e00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000340)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a06b6969ef69dc00d990cc69203637c339392a061f40a8a5a8a541dfe0400f01ef7d0f2e1a1a01460f36660fd3600931a3b786e2989fc46178ae579b") stat(&(0x7f0000001e80)='./file0\x00', &(0x7f0000001ec0)) stat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)) getpgid(0x0) geteuid() getegid() readlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x0) geteuid() getgid() getpid() getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000026c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002700)={{{@in=@multicast1, @in=@remote}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000002800)=0xe8) getgroups(0x0, &(0x7f0000000200)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003200)={{{@in=@remote, @in=@multicast1}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000005700)=0xe8) getresgid(&(0x7f0000003340), &(0x7f0000003380), &(0x7f00000033c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003440)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6}}, &(0x7f0000003540)=0xe8) 03:35:00 executing program 4: perf_event_open(&(0x7f00000001c0)={0x1, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000180)='eth0ppp1\x00', 0x0) ioctl$UI_SET_LEDBIT(0xffffffffffffffff, 0x40045569, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000200)=ANY=[]) fcntl$getflags(0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) getpeername$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000080)=0xfffffffffffffff4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000540)=""/194) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) getsockname(0xffffffffffffffff, &(0x7f00000004c0)=@hci, &(0x7f0000000640)=0x80) connect$packet(0xffffffffffffffff, &(0x7f0000000680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) eventfd2(0x0, 0x0) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) fcntl$getflags(0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:35:00 executing program 3: clock_gettime(0x0, &(0x7f0000000200)) socket$packet(0x11, 0x0, 0x300) shutdown(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000003580), 0x4000000000001ca, 0x0, &(0x7f0000000680)) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() geteuid() stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)) getresuid(&(0x7f00000001c0), &(0x7f00000005c0), &(0x7f0000000600)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000800)=0xc) getresuid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ec0), &(0x7f0000000f00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000f40)={{{@in6=@mcast1, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000001040)=0xe8) getresgid(&(0x7f0000001080), &(0x7f00000010c0), &(0x7f0000001100)) geteuid() getgroups(0x0, &(0x7f0000001140)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001180)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000001280)=0xe8) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001740)={{{@in=@remote, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000001840)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001880), &(0x7f00000018c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001900)={{{@in=@broadcast, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000001a00)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) lstat(&(0x7f0000001ac0)='./file0\x00', &(0x7f0000001b00)) getegid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000001e80)={{{@in6=@dev, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000001f80)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001fc0), &(0x7f0000002000)=0xc) getuid() getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002340), &(0x7f0000002380)=0xc) getgroups(0x0, &(0x7f00000023c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000034c0)={{{@in6, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002400)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000035c0), &(0x7f0000003600)=0xc) getresuid(&(0x7f0000003f00), &(0x7f0000003f40), &(0x7f0000003f80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003fc0), &(0x7f0000004000)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004040)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000004140)=0xe8) getgid() stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004240), &(0x7f0000004280)=0xc) lstat(&(0x7f00000042c0)='./file0\x00', &(0x7f0000004300)) getgroups(0x0, &(0x7f0000004380)) lstat(&(0x7f0000004500)='./file0\x00', &(0x7f0000004540)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:35:00 executing program 4: keyctl$set_reqkey_keyring(0x7, 0xfffffffc) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@mcast1}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000080)=0xdf) open(&(0x7f00000006c0)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000bc0)='nbd\x00') syz_open_dev$dspn(&(0x7f0000000c00)='/dev/dsp#\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000c40)='/dev/input/mice\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000c80)='./file0\x00', 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/vsock\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000d00)='/dev/usbmon#\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0) syz_open_dev$midi(&(0x7f0000002240)='/dev/midi#\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000002280)='/dev/sequencer\x00', 0x0, 0x0) syz_open_dev$usb(&(0x7f00000022c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) syz_open_dev$admmidi(&(0x7f0000002300)='/dev/admmidi#\x00', 0x0, 0x0) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000002480)={&(0x7f0000000700), 0xc, &(0x7f0000002440)={&(0x7f0000002340)={0x14}, 0x14}}, 0x0) getegid() socket$inet6_dccp(0xa, 0x6, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000007c0)=@filter={'filter\x00', 0xe, 0x4, 0x3a0, 0x340, 0xf0, 0x1e0, 0x0, 0xf0, 0x340, 0x340, 0x340, 0x340, 0x340, 0x4, &(0x7f0000000600), {[{{@uncond, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@local, @remote, [], [], 'ip6tnl0\x00', 'bond0\x00'}, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@local, @dev, [], [], 'veth1_to_bond\x00', 'bond_slave_0\x00'}, 0x0, 0xc8, 0xf0}, @common=@unspec=@STANDARD={0x28}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x400) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000000c0)=0xe8) getgid() [ 941.165185] audit: type=1326 audit(2000000101.014:64): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=26660 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:35:01 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0xfffffffffffffdd1, 0x0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0xfffffffffffffdc1) creat(&(0x7f0000000700)='./bus\x00', 0x0) creat(&(0x7f00000003c0)='./bus\x00', 0x0) gettid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000001c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000200)=']\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000480)) getpgrp(0x0) getpgrp(0x0) getpgrp(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f0000000300)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) getpgrp(0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) gettid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000002c0)) getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001cc0)={{{@in6=@dev, @in6=@dev}}, {{}, 0x0, @in6}}, &(0x7f0000001dc0)=0xe8) getgroups(0x0, &(0x7f0000001e00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000340)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a06b6969ef69dc00d990cc69203637c339392a061f40a8a5a8a541dfe0400f01ef7d0f2e1a1a01460f36660fd3600931a3b786e2989fc46178ae579b") stat(&(0x7f0000001e80)='./file0\x00', &(0x7f0000001ec0)) stat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)) getpgid(0x0) geteuid() getegid() readlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x0) geteuid() getgid() getpid() getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000026c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002700)={{{@in=@multicast1, @in=@remote}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000002800)=0xe8) getgroups(0x0, &(0x7f0000000200)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003200)={{{@in=@remote, @in=@multicast1}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000005700)=0xe8) getresgid(&(0x7f0000003340), &(0x7f0000003380), &(0x7f00000033c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003440)={{{@in=@remote, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6}}, &(0x7f0000003540)=0xe8) 03:35:01 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080), 0x2e7) 03:35:01 executing program 1: mlockall(0x4) seccomp(0x0, 0x0, &(0x7f0000000100)) utime(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000240)) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000200)=ANY=[], &(0x7f0000000380)) finit_module(0xffffffffffffffff, &(0x7f0000000540)="656c6912fe7522", 0x0) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000440)={'broute\x00'}, &(0x7f0000000140)=0x78) pipe2$9p(&(0x7f0000000280), 0x0) write$P9_RRENAME(0xffffffffffffffff, &(0x7f00000002c0)={0x7}, 0x7) memfd_create(&(0x7f0000000680)='-/\x00', 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000006c0), 0xc, &(0x7f0000000880)={&(0x7f0000000700)=@deltaction={0x14}, 0x14}}, 0x0) shutdown(0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1ffffffffffffe8d}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000080)={0x0, @rand_addr, @loopback}, &(0x7f00000000c0)=0xc) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f00000005c0)={@empty, @mcast1, @dev}) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000580)) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000640)) syz_execute_func(&(0x7f0000000540)="42805da0a9a3ef69dc0f01ee0dce41cbd9d99162a33d06290028770f0f993d233d234142d85d096b2179660f5474f200bae5e5e57545262e1ac4010d64ac1e5d31a3b7e29871bb7f") 03:35:01 executing program 0: keyctl$set_reqkey_keyring(0x15, 0x0) pipe(&(0x7f00000001c0)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fstat(0xffffffffffffffff, &(0x7f0000000680)) fstat(0xffffffffffffffff, &(0x7f0000000700)) getuid() getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f00000008c0)={0x10}, 0x10) socket$key(0xf, 0x3, 0x2) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@loopback}, &(0x7f00000002c0)=0x14) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000500), &(0x7f0000000540)=0x20) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000580)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2}}}, &(0x7f0000000640)=0x98) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000180)) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000000)={0x0, @local, @multicast1}, &(0x7f0000000100)=0xc) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000240)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000300)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:35:01 executing program 5: rseq(&(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)}, 0xffffffffffffffdb, 0x0, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000240)) ioctl$KVM_GET_PIT(0xffffffffffffffff, 0xc048ae65, &(0x7f0000000380)) seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000000)) 03:35:01 executing program 2: setrlimit(0x7, &(0x7f0000000040)={0x0, 0x1000000000000}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000940), 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a80)={{{@in=@dev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000080)=0xfffffffffffffda6) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000600)=ANY=[]) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f0000000740)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000008c0)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:35:01 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x638, 0x8083) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, [0xfffffffe]}) 03:35:01 executing program 3: keyctl$set_reqkey_keyring(0x5, 0xffffffffffffffff) pipe(&(0x7f0000000240)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'ip6gre0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001f00)={{{@in6=@mcast2, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000002000)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000002040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002080)=0x14, 0x0) 03:35:01 executing program 4: keyctl$set_reqkey_keyring(0x7, 0xfffffffc) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@mcast1}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000080)=0xdf) open(&(0x7f00000006c0)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000bc0)='nbd\x00') syz_open_dev$dspn(&(0x7f0000000c00)='/dev/dsp#\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000c40)='/dev/input/mice\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000c80)='./file0\x00', 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/vsock\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000d00)='/dev/usbmon#\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0) syz_open_dev$midi(&(0x7f0000002240)='/dev/midi#\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000002280)='/dev/sequencer\x00', 0x0, 0x0) syz_open_dev$usb(&(0x7f00000022c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) syz_open_dev$admmidi(&(0x7f0000002300)='/dev/admmidi#\x00', 0x0, 0x0) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000002480)={&(0x7f0000000700), 0xc, &(0x7f0000002440)={&(0x7f0000002340)={0x14}, 0x14}}, 0x0) getegid() socket$inet6_dccp(0xa, 0x6, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000007c0)=@filter={'filter\x00', 0xe, 0x4, 0x3a0, 0x340, 0xf0, 0x1e0, 0x0, 0xf0, 0x340, 0x340, 0x340, 0x340, 0x340, 0x4, &(0x7f0000000600), {[{{@uncond, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@local, @remote, [], [], 'ip6tnl0\x00', 'bond0\x00'}, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@local, @dev, [], [], 'veth1_to_bond\x00', 'bond_slave_0\x00'}, 0x0, 0xc8, 0xf0}, @common=@unspec=@STANDARD={0x28}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x400) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000000c0)=0xe8) getgid() 03:35:01 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x638, 0x8083) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, [0xfffffffe]}) [ 942.244869] audit: type=1326 audit(2000000102.094:65): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=26711 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:35:02 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x638, 0x8083) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, [0xfffffffe]}) 03:35:02 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4021, 0x0, @local, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, &(0x7f0000000000)) 03:35:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mountinfo\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 03:35:02 executing program 2: clock_gettime(0x10000000006, &(0x7f00000002c0)) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) openat$vcs(0xffffffffffffff9c, &(0x7f0000001000)='/dev/vcs\x00', 0x0, 0x0) geteuid() fstat(0xffffffffffffffff, &(0x7f00000005c0)) getgid() gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c80)={{{@in6=@local, @in6}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000900)=0xe8) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000440), 0xc, &(0x7f0000000880), 0x0, &(0x7f0000000d80)}, 0x0) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000140)) futex(&(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) getitimer(0x0, &(0x7f0000000300)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)="b1b26ce7d75f55f8b9bb6c3fd1f9242e2f6367726f006968", 0x200002, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000006c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:35:02 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x638, 0x8083) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, [0xfffffffe]}) 03:35:02 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x8008af26, &(0x7f0000001700)) 03:35:02 executing program 5: mount$9p_virtio(&(0x7f00000002c0)='IPVS\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000700)='9p\x00', 0x0, &(0x7f0000000740)={'trans=virtio,'}) clock_gettime(0x0, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000080), 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000380)={0x0, 0x1, 0x6, @local}, 0x10) syz_execute_func(&(0x7f0000000500)="428055a0876969effb69dcfdd9d94e8f044ab9003c80203c80207fb432322333331837370f38211ac4c19086d9f28fc965670f19c54e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f07b80802403cec4c229f7014b") getegid() openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 03:35:02 executing program 1: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f0000003000)=[{&(0x7f0000000000)="1f0000001800030007fffd946fa283bc80200000000400051f1d8568080002", 0x1f}], 0x1}, 0x0) 03:35:02 executing program 3: clock_adjtime(0x7, &(0x7f0000000240)) ppoll(&(0x7f0000000080), 0x97, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000040), 0x8) recvmsg(0xffffffffffffff9c, &(0x7f0000000640)={&(0x7f0000000140)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @rand_addr}}}, 0x80, &(0x7f0000000500), 0x0, &(0x7f0000000540)=""/235, 0xeb}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:35:02 executing program 4: keyctl$set_reqkey_keyring(0x7, 0xfffffffc) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@mcast1}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000080)=0xdf) open(&(0x7f00000006c0)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000bc0)='nbd\x00') syz_open_dev$dspn(&(0x7f0000000c00)='/dev/dsp#\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000c40)='/dev/input/mice\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000c80)='./file0\x00', 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/vsock\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000d00)='/dev/usbmon#\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0) syz_open_dev$midi(&(0x7f0000002240)='/dev/midi#\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000002280)='/dev/sequencer\x00', 0x0, 0x0) syz_open_dev$usb(&(0x7f00000022c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) syz_open_dev$admmidi(&(0x7f0000002300)='/dev/admmidi#\x00', 0x0, 0x0) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000002480)={&(0x7f0000000700), 0xc, &(0x7f0000002440)={&(0x7f0000002340)={0x14}, 0x14}}, 0x0) getegid() socket$inet6_dccp(0xa, 0x6, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000007c0)=@filter={'filter\x00', 0xe, 0x4, 0x3a0, 0x340, 0xf0, 0x1e0, 0x0, 0xf0, 0x340, 0x340, 0x340, 0x340, 0x340, 0x4, &(0x7f0000000600), {[{{@uncond, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@local, @remote, [], [], 'ip6tnl0\x00', 'bond0\x00'}, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@local, @dev, [], [], 'veth1_to_bond\x00', 'bond_slave_0\x00'}, 0x0, 0xc8, 0xf0}, @common=@unspec=@STANDARD={0x28}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x400) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000000c0)=0xe8) getgid() 03:35:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mountinfo\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 03:35:02 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={&(0x7f0000000180), 0xc, &(0x7f0000000500)={&(0x7f0000000240)=@polexpire={0xcc, 0x1b, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, [@policy_type={0xc, 0x10, {0x1}}]}, 0xcc}}, 0x0) 03:35:03 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={&(0x7f0000000180), 0xc, &(0x7f0000000500)={&(0x7f0000000240)=@polexpire={0xcc, 0x1b, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, [@policy_type={0xc, 0x10, {0x1}}]}, 0xcc}}, 0x0) [ 943.271754] audit: type=1326 audit(2000000103.114:66): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=26759 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:35:03 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={&(0x7f0000000180), 0xc, &(0x7f0000000500)={&(0x7f0000000240)=@polexpire={0xcc, 0x1b, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, [@policy_type={0xc, 0x10, {0x1}}]}, 0xcc}}, 0x0) 03:35:03 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={&(0x7f0000000180), 0xc, &(0x7f0000000500)={&(0x7f0000000240)=@polexpire={0xcc, 0x1b, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, [@policy_type={0xc, 0x10, {0x1}}]}, 0xcc}}, 0x0) 03:35:03 executing program 2: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000018c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001900)={{{@in=@remote, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001a00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000001a40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002b40)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000002b00)="5b2d70726f637d656d31b800"}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002b80)={{{@in, @in=@local}}, {{@in=@rand_addr}, 0x0, @in6=@remote}}, &(0x7f0000002c80)=0xe8) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000002cc0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000002d00)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000003000)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003040), &(0x7f0000003080)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000030c0), &(0x7f0000003100)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000004440)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004480)={{{@in6, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000004580)=0xe8) getgid() getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000045c0)={{{@in6=@dev, @in6=@local}}, {{}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000046c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004700)) getpid() getresuid(&(0x7f0000004780), &(0x7f00000047c0), &(0x7f0000004800)) getegid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000004880)=0x926503564a95b43c) lstat(&(0x7f00000048c0)='./file0\x00', &(0x7f0000004900)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004980)) geteuid() getgroups(0x0, &(0x7f00000049c0)) getpid() lstat(&(0x7f0000006180)='./file0\x00', &(0x7f00000061c0)) getegid() getpid() geteuid() seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) syz_execute_func(&(0x7f0000000500)="1cd2805da0616969692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9c81ceefa6be27973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90df55b498985fc3") 03:35:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mountinfo\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 03:35:03 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) setsockopt$sock_void(r0, 0x29, 0x23, 0x0, 0x0) 03:35:03 executing program 1: socket$inet6_dccp(0xa, 0x6, 0x0) connect(0xffffffffffffffff, &(0x7f00000003c0)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'wp384-generic\x00'}, 0x80) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000900)=ANY=[]) prctl$getname(0x10, &(0x7f0000000200)=""/133) semget$private(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000680)=ANY=[], 0x0) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f00000002c0)=""/153) set_tid_address(&(0x7f0000000180)) accept$inet6(0xffffffffffffffff, &(0x7f00000007c0), &(0x7f0000000780)=0x1c) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000380), 0x4) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000500)=""/244) clock_nanosleep(0x0, 0x0, &(0x7f0000000040), &(0x7f00000004c0)) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) gettid() recvmmsg(0xffffffffffffffff, &(0x7f0000004800), 0x0, 0x0, &(0x7f0000004940)) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, "002cf77bc9ad0b5570b4eb9309b79362259859077046daba8b072b5bea7fcb7b"}) semget$private(0x0, 0x0, 0x0) bind$pptp(0xffffffffffffffff, &(0x7f0000000440)={0x18, 0x2, {0x0, @local}}, 0x1e) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000480)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000600)) clock_gettime(0x0, &(0x7f0000000740)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000880)) socket$packet(0x11, 0x0, 0x300) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000640)) 03:35:03 executing program 5: futex(&(0x7f0000000040), 0x5, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) creat(&(0x7f00000001c0)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000000c0)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000680)) syz_open_procfs(0x0, &(0x7f0000000600)="6664696dd5846516108ec60000000006cddd2f3400e5fe345828ac03270304d97d5c5ed37d08d5725a1dc218a9c8ce5da2fd64169c059d7e73") creat(&(0x7f0000000080)='./bus\x00', 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) write$input_event(0xffffffffffffffff, &(0x7f00000002c0)={{0x77359400}}, 0x18) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)) getresuid(&(0x7f0000000800), &(0x7f0000000840), &(0x7f0000000880)) stat(&(0x7f00000008c0)='./bus\x00', &(0x7f0000000900)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a00), &(0x7f0000000a40)=0xc) getgid() getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000000d40)) fstat(0xffffffffffffffff, &(0x7f0000000dc0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003880)) geteuid() getgroups(0x0, &(0x7f00000038c0)) getpgid(0xffffffffffffffff) lstat(&(0x7f0000003900)='./bus\x00', &(0x7f0000003940)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000039c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003a00)={{{@in=@rand_addr, @in6=@dev}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f0000003b00)=0xe8) getresgid(&(0x7f0000003b40), &(0x7f0000003b80), &(0x7f0000003bc0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003c00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003c40)={{{@in6=@mcast2, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@dev}}, &(0x7f0000003d40)=0xe8) getgroups(0x0, &(0x7f0000003d80)) 03:35:03 executing program 3: userfaultfd(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:35:03 executing program 4: keyctl$set_reqkey_keyring(0x7, 0xfffffffc) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@mcast1}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000080)=0xdf) open(&(0x7f00000006c0)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000bc0)='nbd\x00') syz_open_dev$dspn(&(0x7f0000000c00)='/dev/dsp#\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000c40)='/dev/input/mice\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000c80)='./file0\x00', 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/vsock\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000d00)='/dev/usbmon#\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0) syz_open_dev$midi(&(0x7f0000002240)='/dev/midi#\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000002280)='/dev/sequencer\x00', 0x0, 0x0) syz_open_dev$usb(&(0x7f00000022c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) syz_open_dev$admmidi(&(0x7f0000002300)='/dev/admmidi#\x00', 0x0, 0x0) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000002480)={&(0x7f0000000700), 0xc, &(0x7f0000002440)={&(0x7f0000002340)={0x14}, 0x14}}, 0x0) getegid() socket$inet6_dccp(0xa, 0x6, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000007c0)=@filter={'filter\x00', 0xe, 0x4, 0x3a0, 0x340, 0xf0, 0x1e0, 0x0, 0xf0, 0x340, 0x340, 0x340, 0x340, 0x340, 0x4, &(0x7f0000000600), {[{{@uncond, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@local, @remote, [], [], 'ip6tnl0\x00', 'bond0\x00'}, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@local, @dev, [], [], 'veth1_to_bond\x00', 'bond_slave_0\x00'}, 0x0, 0xc8, 0xf0}, @common=@unspec=@STANDARD={0x28}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x400) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000000c0)=0xe8) getgid() 03:35:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mountinfo\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) [ 944.320840] audit: type=1326 audit(2000000104.164:67): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=26805 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:35:04 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") r1 = socket$kcm(0x29, 0x2, 0x0) unshare(0x400) getsockopt$sock_linger(r1, 0x1, 0x26, &(0x7f0000000400), &(0x7f0000000440)=0x8) 03:35:04 executing program 2: ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) seccomp(0x0, 0x0, &(0x7f0000000100)) mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) request_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080), &(0x7f0000000140)="252d6370757365745c1b00", 0xfffffffffffffffc) futex(&(0x7f0000000500), 0x0, 0x0, &(0x7f0000000880)={0x0, 0x989680}, &(0x7f0000000300), 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)) getegid() lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f00000005c0)) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/cgroup\x00') seccomp(0x0, 0x0, &(0x7f00000004c0)={0x0, &(0x7f0000000480)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$P9_RLOCK(0xffffffffffffffff, &(0x7f0000000440)={0x8}, 0x8) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') mmap(&(0x7f0000018000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000002c0)=ANY=[]) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000180)=0xc) syz_execute_func(&(0x7f00000003c0)="42805da0120fef69dc0f58eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:35:04 executing program 0: futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000240)=""/165) socket$alg(0x26, 0x5, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="f9428055a0b4b48769ef61dc7cd9f0008f00008020c421fa7fb432322333331837c4011573d8cfc4c10c96d9f28fc9410feefa4e2179fbe5a0a67565a675650cb30080ff99e9c4010d64ac1e5d33a3b7720bf080240308df63da") 03:35:04 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000140)) syz_execute_func(&(0x7f00000001c0)="42805da0610fef69dc0fc201e5eeeeeeaa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f03e40e338e5e5a90175e7e7442e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c4a31122e90a746efafe9f7f") 03:35:04 executing program 3: madvise(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) pipe2(&(0x7f0000000280), 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000700)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000005c0), 0xc, &(0x7f00000007c0)={&(0x7f00000001c0)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@empty, @local, @dev}, &(0x7f0000000180)=0xc) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) memfd_create(&(0x7f00000001c0)='.\x00', 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000200)) rt_sigpending(&(0x7f0000000080), 0x8) io_setup(0x0, &(0x7f0000000240)) signalfd(0xffffffffffffff9c, &(0x7f0000000380), 0x8) ustat(0x0, &(0x7f0000000780)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000480)) rt_sigaction(0x0, &(0x7f0000000140)={&(0x7f0000000040)="4276c8c461fc576fc08fe9a893e9c402d0f34b756745ccf242aed30dfeefffff36e300dacb660f1bb008000000", {}, 0x0, &(0x7f00000000c0)="c443d148a38d000000fe2626660f62e2c4c201397f056426c065000ec462a99be8366536de494bc481a25d670fc4416de4b800000000660f38dbe726430f6be1"}, 0x0, 0x8, &(0x7f0000000180)) request_key(&(0x7f0000000300)='encrypted\x00', &(0x7f0000000340), &(0x7f00000003c0)='.\x00', 0xfffffffffffffffd) connect(0xffffffffffffffff, &(0x7f00000004c0)=@nl=@unspec, 0x80) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@broadcast, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000680)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:04 executing program 1: clock_gettime(0x3, &(0x7f0000000240)) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f0000000640), &(0x7f0000000580), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000080)) getpgid(0x0) getresuid(&(0x7f0000000540), &(0x7f00000005c0), &(0x7f0000000600)) getgid() getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000680)={{{@in6=@dev}}, {{}, 0x0, @in=@remote}}, &(0x7f0000000780)=0xe8) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c) sched_getparam(0x0, &(0x7f0000000180)) socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(0xffffffffffffffff, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x2e) sendmmsg(0xffffffffffffffff, &(0x7f0000005fc0), 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000240), 0x0) socketpair$inet(0x1e, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0}) sendmmsg(0xffffffffffffffff, &(0x7f0000007780), 0x0, 0x0) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000800)) getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000a80)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000b80)=0xe8) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000c40)) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000c80)={{{@in6=@loopback, @in=@dev}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000000d80)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000dc0), &(0x7f0000000e00)=0xc) 03:35:05 executing program 4: keyctl$set_reqkey_keyring(0xa, 0x0) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) syz_open_dev$sndpcmp(&(0x7f0000000400)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000003500)={{{@in=@dev, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f0000003600)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000003640)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000003680)={{{@in6=@mcast1, @in=@multicast2}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f0000003780)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f00000037c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000003800)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000003840)={'vcan0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003940)={@loopback}, &(0x7f0000003980)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f00000039c0)={'vcan0\x00'}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000003dc0)={&(0x7f0000000440), 0xc, &(0x7f0000003d80)={&(0x7f0000003a00)={0x14}, 0x14}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@mcast1}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000080)=0xdf) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000004c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000580)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000005c0)) syz_open_procfs(0x0, &(0x7f0000000640)='uid_map\x00') ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f00000003c0)) open(&(0x7f00000006c0)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000480)='nbd\x00') syz_open_dev$dspn(&(0x7f0000000c00)='/dev/dsp#\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000c40)='/dev/input/mice\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000c80)='./file0\x00', 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/vsock\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000d00)='/dev/usbmon#\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0) syz_open_dev$midi(&(0x7f0000002240)='/dev/midi#\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000002280)='/dev/sequencer\x00', 0x0, 0x0) syz_open_dev$usb(&(0x7f00000022c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) syz_open_dev$admmidi(&(0x7f0000002300)='/dev/admmidi#\x00', 0x0, 0x0) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000002480)={&(0x7f0000000700), 0xc, &(0x7f0000002440)={&(0x7f0000000d80)=ANY=[]}}, 0x0) getegid() socket$inet6_dccp(0xa, 0x6, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000007c0)=ANY=[], 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000000c0)=0xe8) 03:35:05 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/87, 0x57) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000007e40)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet(0x2, 0x0, 0x0) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000640)=""/203, &(0x7f0000000040)=0xfffffffffffffdcb) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)="cb00") getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000fc0)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f00000010c0)=0xe8) getegid() geteuid() getegid() lstat(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)) lstat(&(0x7f00000011c0)='./file0\x00', &(0x7f0000001200)) fstat(0xffffffffffffff9c, &(0x7f0000001280)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001300), &(0x7f0000001340)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001380)={{{@in6=@mcast2, @in=@broadcast}}, {{@in=@local}}}, &(0x7f0000001480)=0xe8) getresgid(&(0x7f00000014c0), &(0x7f0000001500), &(0x7f0000001540)) getuid() stat(&(0x7f0000001580)='./file1\x00', &(0x7f00000015c0)) getresuid(&(0x7f0000001640), &(0x7f0000001680), &(0x7f00000016c0)) fstat(0xffffffffffffffff, &(0x7f0000001700)) recvmmsg(0xffffffffffffffff, &(0x7f0000005580), 0x0, 0x0, &(0x7f0000005780)) lstat(&(0x7f00000057c0)='./file0\x00', &(0x7f0000005800)) getegid() fstat(0xffffffffffffffff, &(0x7f0000005880)) lstat(&(0x7f0000005900)='./file0\x00', &(0x7f0000005940)) getresuid(&(0x7f00000059c0), &(0x7f0000005a00), &(0x7f0000005a40)) lstat(&(0x7f0000005b40)='./file0\x00', &(0x7f0000005b80)) fstat(0xffffffffffffffff, &(0x7f0000005c00)) getuid() getegid() fstat(0xffffffffffffffff, &(0x7f0000007080)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:35:05 executing program 2: setpriority(0x0, 0x0, 0x0) open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_all\x00', 0x0, 0x0) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, &(0x7f0000000300)) syz_emit_ethernet(0x0, &(0x7f0000000380)=ANY=[], 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)={@remote, @local}, &(0x7f0000000700)=0xc) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x2cc) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000400), 0x32a) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) getegid() lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000740)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000007c0)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000680), 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000180), 0xc, &(0x7f00000003c0)={&(0x7f0000000940)=ANY=[]}}, 0x0) prctl$setname(0xf, &(0x7f0000000040)='bdevselfcgroupself') seccomp(0x0, 0x0, &(0x7f0000000100)) socket$nl_generic(0x10, 0x3, 0x10) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000140), 0x0, 0x0, 0xfffffffffffffffd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da0124fefeddc0f01eea873fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 03:35:05 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x19, &(0x7f0000000300), &(0x7f0000000500)=0x26) 03:35:05 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000f59000), 0x4) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000040)=0x6, 0x4) sendto$inet(r0, &(0x7f0000000300), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x13}}, 0x10) sendto$inet(r0, &(0x7f0000000380)="acbb91070046975d5d248d4c7271a1540f53036c3cc3396fab70b8f72443207b3bc9d2b76a2124327a8dc22115702dfd81d9c5daf3734095c968bb4c931a63cd94bbfe810cf243974b73d5c0d300e011c378fe007fc17bde5460ef55a7bc52faceada0a1928b8c0954a22b092351d191d71a236ce3666aa7ed879036fa14a2003b12433e30c57b350fbe6feed949a51d49b276d1a46c83833560a7d2b01294dc37daab763f8b9ba2b0f08e0042187b182a98537c2fcf65986c2ec491cef3ccff4271f7f4714a4f8b8b94c26d21b943d8b25de7825c543544f06fc88d7e8cb4e52d4bd68639b0f6f2e0805aa8eaf78128bd10cd1218ad64b1bc27f94fb5d4bdc2530ee3", 0x103, 0x0, 0x0, 0x0) write$cgroup_type(r0, &(0x7f00000002c0)='threaded\x00', 0x9) recvfrom(r0, &(0x7f0000000080)=""/206, 0xce, 0x0, &(0x7f0000000180)=@ax25={0x3, {"9d3f3355ac1b08"}}, 0x30) readv(r0, &(0x7f00000014c0)=[{&(0x7f0000001400)=""/163, 0xa3}], 0x1) 03:35:05 executing program 5: keyctl$set_reqkey_keyring(0x5, 0xffffffffffffffff) syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_dev$vcsa(&(0x7f0000000600)='/dev/vcsa#\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000640)={'eql\x00', {0x2, 0x0, @multicast1}}) socket$inet_udplite(0x2, 0x2, 0x88) recvfrom(0xffffffffffffffff, &(0x7f0000000180)=""/58, 0x3a, 0x0, &(0x7f00000001c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000fc0)) getuid() getgid() getpgrp(0x0) stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) getgid() getpid() fstat(0xffffffffffffffff, &(0x7f00000010c0)) fstat(0xffffffffffffffff, &(0x7f0000001140)) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@local, @in6=@remote}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) getresgid(&(0x7f0000001300), &(0x7f0000001340), &(0x7f0000001380)) getpgid(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000013c0)={{{@in=@loopback, @in=@multicast1}}, {{@in=@multicast1}, 0x0, @in=@broadcast}}, &(0x7f00000014c0)=0xe8) getgroups(0x0, &(0x7f0000001500)) accept(0xffffffffffffffff, &(0x7f0000001540)=@in={0x2, 0x0, @dev}, &(0x7f00000015c0)=0x80) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000001640)=0xfffffffffffffebb) geteuid() 03:35:06 executing program 4: keyctl$set_reqkey_keyring(0x10, 0x7) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000001c0)) ioprio_set$pid(0x0, 0x0, 0x0) 03:35:06 executing program 1: futex(&(0x7f0000000040), 0x7, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) mlock2(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe(&(0x7f0000000040)) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0x9) seccomp(0x0, 0x0, &(0x7f0000000100)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) sysfs$3(0x3) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000080)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4011d64ac1e5d31a3b767e2989f7f") 03:35:06 executing program 3: shmget(0x2, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) socket$unix(0x1, 0x0, 0x0) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, "e91f7189591e9233614b00"}, 0xc) listen(0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f000066fff4)=@file={0x0, "e91f7189591e9233614b00"}, 0x6e) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x0, "e91f7189591e9233614b00"}, 0x6e) listen(0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe2}]}) syz_execute_func(&(0x7f00000003c0)="428055a06b6969ef69dc00d99069203737c3397c2a8e0f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e298262e6426f30f2b05090000003f") openat$ppp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ppp\x00', 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='trusted.overlay.redirect\x00', &(0x7f00000001c0)='./file0\x00', 0x8, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000680)) socket$inet_tcp(0x2, 0x1, 0x0) shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000580)=""/246) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000200)={0x0, @multicast2, 0x0, 0x0, 'none\x00'}, 0x2c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000740)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000280)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000380)=0xc) stat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)) getgid() 03:35:06 executing program 2: memfd_create(&(0x7f00000002c0)='\x00', 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002840), 0x4) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)=""/84, &(0x7f00000001c0)=0x54) syz_execute_func(&(0x7f0000000440)="42805da0d30fef69dc0f01ee660f3a608600088041cb913591913d06c481c954882accf7fe0a0024240f78a5d6d9d6d93d23410feefaf32178660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") readv(0xffffffffffffffff, &(0x7f00000027c0), 0x0) accept4(0xffffffffffffffff, &(0x7f00000004c0)=@nfc, &(0x7f0000000540)=0x80, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000580), 0x4) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f00000005c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000200)) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) prctl$setptracer(0x59616d61, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000300)) getresgid(&(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)) lchown(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) pipe2(&(0x7f0000000640), 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'yam0\x00'}) fstat(0xffffffffffffffff, &(0x7f0000000680)) 03:35:06 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x800) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000004ffc)=0x20) readv(r0, &(0x7f0000008fe0)=[{&(0x7f0000011000)=""/232, 0xe8}], 0x1) 03:35:06 executing program 0: futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) creat(&(0x7f0000000480)='./file0\x00', 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000500), 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000040)) connect$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @multicast2}, 0x10) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f00000005c0), &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000540), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='cgroup.type\x00'}, 0x10) epoll_create1(0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000003c0)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000200)={0x0, {{0x2, 0x0, @remote}}, {{0x2, 0x0, @multicast1}}}, 0x108) pivot_root(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000380)='./file0\x00') pipe(&(0x7f00000000c0)) ioctl$UI_SET_MSCBIT(0xffffffffffffffff, 0x40045568, 0x0) pivot_root(&(0x7f0000000580)='./file0\x00', &(0x7f0000000600)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") socket$inet6_tcp(0xa, 0x1, 0x0) 03:35:06 executing program 5: clock_gettime(0x7, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") 03:35:06 executing program 4: futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) rename(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000380)='yeah\x00', 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000500)) syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000800)={0x0, @empty, @dev}, &(0x7f0000000840)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000880)={0x0, @multicast1, @local}, &(0x7f00000008c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a40)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000b40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000bc0)={{{@in=@local, @in=@dev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0)={@multicast1, @remote}, &(0x7f0000000e00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003500)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000003600)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000003640), &(0x7f0000003680)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003780)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003880)={0x0, @loopback, @multicast1}, &(0x7f00000038c0)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f00000039c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000003a00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003a40)={@local}, &(0x7f0000003a80)=0x14) accept4(0xffffffffffffffff, &(0x7f0000003ac0)=@hci, &(0x7f0000003b40)=0x80, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000003b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003bc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003d40)={{{@in6, @in=@local}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000003e40)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000005b40), 0x0, 0x0, &(0x7f0000005c40)={0x77359400}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000005c80)={@empty, @dev}, &(0x7f0000005cc0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000005d00), &(0x7f0000005d40)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000007740)={@multicast2, @remote}, &(0x7f0000007780)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007880)={@mcast2}, &(0x7f00000078c0)=0x14) seccomp(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000080)="428055a0690fef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f00000003c0)) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:35:07 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x80801, 0x3) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x0, {0x0, 0x0, 0x0, 0x7}}, 0xe) connect(r0, &(0x7f0000000000)=@hci={0x1f, 0x0, 0x3}, 0x80) 03:35:07 executing program 4: keyctl$invalidate(0x11, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@mcast2, @in6}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) request_key(&(0x7f00000006c0)='big_key\x00', &(0x7f0000000700), &(0x7f0000000740)='/dev/adsp#\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000780)='blacklist\x00', &(0x7f00000007c0), &(0x7f0000000800)='/vmnet0&louser\x00', 0x0) add_key(&(0x7f0000000840)='blacklist\x00', &(0x7f0000000880), &(0x7f00000008c0), 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='net/ip6_tables_names\x00') getgroups(0x0, &(0x7f0000000000)) fchown(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000003c0)) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000400), 0xd) syz_extract_tcp_res(&(0x7f0000000040), 0x0, 0x0) getrandom(&(0x7f0000000480)=""/52, 0x34, 0x0) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000440), 0x0, 0x0, 0xfffffffffffffff9) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe6}]}) syz_execute_func(&(0x7f00000004c0)="428055a0610fef69dcc402150339ff0f8f49189850312ef2f2ec712d0f76382127c42127fd2520410feefa4e217919fbfbf54177455de0932ebc2ebc0d64ac1e5d9f997f") 03:35:07 executing program 3: mincore(&(0x7f0000ffa000/0x3000)=nil, 0x3000, &(0x7f00000008c0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)) setxattr$trusted_overlay_redirect(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x0) getgroups(0x0, &(0x7f0000000180)) fchown(0xffffffffffffffff, 0x0, 0x0) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000000340)={0xa0}, 0xa0) munlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f0000000980)=0xff8d) memfd_create(&(0x7f0000000200)='/dev/hwrng\x00', 0x0) seccomp(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000080)="428055a0690fef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getuid() syz_genetlink_get_family_id$fou(&(0x7f00000004c0)='fou\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000240)=0xc) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) connect$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f00000008c0)=@buf={0x0, &(0x7f0000001440)}) chroot(&(0x7f0000000840)='./file0\x00') 03:35:07 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000100)='\b\x005', 0x3) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r1, 0x0, 0xca, &(0x7f0000000000), 0x10) 03:35:07 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000100)='\b\x005', 0x3) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r1, 0x0, 0xca, &(0x7f0000000000), 0x10) 03:35:07 executing program 2: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8040, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fcntl$setlease(r0, 0x400, 0x0) close(r0) 03:35:07 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000100)='\b\x005', 0x3) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r1, 0x0, 0xca, &(0x7f0000000000), 0x10) 03:35:07 executing program 2: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8040, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fcntl$setlease(r0, 0x400, 0x0) close(r0) 03:35:07 executing program 0: getuid() socket$nl_route(0x10, 0x3, 0x0) getpgid(0x0) syz_open_dev$rtc(&(0x7f00000003c0)='/dev/rtc#\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/sequencer\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f000000af00)) getgid() openat$ion(0xffffffffffffff9c, &(0x7f000000af40)='/dev/ion\x00', 0x0, 0x0) syz_open_dev$amidi(&(0x7f000000af80)='/dev/amidi#\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f000000afc0)='/dev/snapshot\x00', 0x0, 0x0) socket$bt_hidp(0x1f, 0x3, 0x6) socket$inet_dccp(0x2, 0x6, 0x0) seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:35:07 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000100)='\b\x005', 0x3) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r1, 0x0, 0xca, &(0x7f0000000000), 0x10) 03:35:07 executing program 5: setpriority(0x0, 0x0, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) keyctl$set_reqkey_keyring(0x11, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) io_setup(0x0, &(0x7f0000000040)) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000440)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:35:07 executing program 2: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8040, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fcntl$setlease(r0, 0x400, 0x0) close(r0) 03:35:08 executing program 1: sysinfo(&(0x7f0000000140)=""/245) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") lsetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=@known='trusted.overlay.opaque\x00', &(0x7f0000000180)='mime_type.\x00', 0xb, 0x0) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:35:08 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) write$uinput_user_dev(r0, &(0x7f0000000c80)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) write$uinput_user_dev(r0, &(0x7f00000000c0)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x45c) 03:35:08 executing program 2: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8040, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fcntl$setlease(r0, 0x400, 0x0) close(r0) 03:35:08 executing program 3: clock_gettime(0x9, &(0x7f00000001c0)) perf_event_open(&(0x7f0000c86f88)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/ppp\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000980)=ANY=[], 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f0000000000)) fstat(0xffffffffffffffff, &(0x7f00000028c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000004180)) fstat(0xffffffffffffffff, &(0x7f0000004240)) recvmmsg(0xffffffffffffff9c, &(0x7f0000002bc0), 0x0, 0x0, &(0x7f0000002e00)={0x77359400}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000500)={{}, 'syz0\x00'}) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='system!\x00system\x00'}, 0x10) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000180), 0x10) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000940)=""/17) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:08 executing program 1: clock_adjtime(0x0, &(0x7f0000000280)) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$P9_RXATTRWALK(0xffffffffffffffff, &(0x7f00000001c0)={0xe148b0d6c664adc5}, 0xf) clock_gettime(0x0, &(0x7f0000000140)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000240), 0xc, &(0x7f00000003c0)={&(0x7f00000004c0)={0x14}, 0x14}}, 0x0) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x0) pipe2(&(0x7f0000000440), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$BLKREPORTZONE(0xffffffffffffffff, 0xc0101282, &(0x7f0000000580)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000180)) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000080)) clock_gettime(0x0, &(0x7f0000000200)) syz_execute_func(&(0x7f0000000c00)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:35:08 executing program 2: ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) socket$inet6_udplite(0xa, 0x2, 0x88) syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)=""/98) openat$mixer(0xffffffffffffff9c, &(0x7f0000000440)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000800)={0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000180)=0x98) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000b00)=ANY=[], &(0x7f00000008c0)) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000b80)}, &(0x7f0000000c40)=0x10) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0x37) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000500), 0x8) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) syz_open_dev$dspn(&(0x7f00000005c0)='/dev/dsp#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000900)=ANY=[]) semget$private(0x0, 0x0, 0x0) prctl$getname(0x10, &(0x7f0000000200)=""/133) semget$private(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000640)="428055a0636969ef69dc00d9c421a05d2fc4e2799ba10000010036650f198a1a5ba3c94d397c2a0f0fcdf30fd6d0300f38211a40a5c07f41dfe0400f01efe5e57d0fecba1a1a01460f01ee45dfde9f") [ 948.498409] input: syz1 as /devices/virtual/input/input21 [ 948.544921] input: syz1 as /devices/virtual/input/input22 03:35:08 executing program 4: prlimit64(0x0, 0x0, &(0x7f0000000180), &(0x7f00000001c0)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getgroups(0x0, &(0x7f0000000600)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000480)={{}, {0xa, 0x0, 0x0, @dev}}, 0x5c) stat(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)) socket$inet_tcp(0x2, 0x1, 0x0) open(&(0x7f0000000200)='./file0/file0\x00', 0x0, 0x0) name_to_handle_at(0xffffffffffffffff, &(0x7f0000000240)='./file0/file0\x00', &(0x7f00000003c0)={0x8}, &(0x7f0000000280), 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @dev}}) seccomp(0x1, 0x0, &(0x7f0000001680)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0ce6969ef69dc00d990c841ff0f183fc413197c2a060f38da211a66460f3a0f4d00baf28fc9410feefa4175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:08 executing program 0: getrandom(&(0x7f0000000200)=""/148, 0x340, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), 0x4) getresuid(&(0x7f00000000c0), &(0x7f0000000200), &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b000002c42111c25d0b72383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f56") 03:35:08 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f00000004c0), &(0x7f00000000c0)) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000740)={{}, 'syz0\x00'}) mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000980)=""/165) open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001480)="428055a0c26969ef69dc00d9906920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01ee31a3b786e298262e6426f30f2b05090000003f") 03:35:09 executing program 3: ioprio_set$uid(0x2, 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000280)) keyctl$set_reqkey_keyring(0x3, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) gettid() getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000000b00)=0xc) gettid() fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') keyctl$set_reqkey_keyring(0x4, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000340)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b80)={{{@in=@dev}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000000c80)=0xe8) stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000d00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000040)='IPVS\x00', 0xffffffffffffffff}, 0x30) 03:35:09 executing program 2: prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0xfffffffffffffec5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") 03:35:09 executing program 1: add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0), 0x0, 0x0, 0xfffffffffffffffb) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0320fef69dc0f01eece73fe19fa380f38211af3f242d2be00000000c481b5e5bc2b0000002146d9e46b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") dup2(0xffffffffffffff9c, 0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000180)={0x0, @multicast1, @loopback}, &(0x7f00000001c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@multicast2, @in=@dev}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000340)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @dev, @local}, &(0x7f00000003c0)=0xc) accept4(0xffffffffffffffff, &(0x7f0000000400)=@can, &(0x7f0000000500)=0x80, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000006d80)={'vlan0\x00'}) recvmmsg(0xffffffffffffff9c, &(0x7f0000009600), 0x0, 0x0, &(0x7f0000009680)={0x0, 0x989680}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000096c0)={{{@in=@remote, @in6=@dev}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f00000097c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000009800)={{{@in=@remote, @in6=@ipv4={[], [], @broadcast}}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f0000009900)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f0000009940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000009980)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000009b40)={{{@in6=@mcast1, @in6=@local}}, {{@in6}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000009c40)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a440)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f000000a480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a4c0)=0x14, 0x0) accept$packet(0xffffffffffffffff, &(0x7f000000a500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a540)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f000000b6c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000b700)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f000000b740), &(0x7f000000b780)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000b7c0)={{{@in=@rand_addr, @in6}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f000000b8c0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f000000ba80)={@dev, @local}, &(0x7f000000bac0)=0xc) 03:35:09 executing program 4: getpriority(0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000340)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000600)={{{@in=@dev, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f00000004c0)=0xe8) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000900)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000980)={{{@in=@multicast1, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000000740)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000b00)={{{@in6=@dev, @in=@multicast1}}, {{@in6}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000000c00)=0xe8) getuid() getuid() geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c40)={{{@in6=@remote, @in6=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000000d40)=0xe8) getresgid(&(0x7f0000000d80), &(0x7f0000000dc0), &(0x7f0000000e00)) getresgid(&(0x7f0000000e40), &(0x7f0000000e80), &(0x7f0000000ec0)) getgid() lstat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) getgid() getgroups(0x0, &(0x7f0000000fc0)) lstat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) lsetxattr$system_posix_acl(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='system.posix_acl_access\x00', &(0x7f0000001180), 0x24, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$getname(0x10, &(0x7f0000000580)=""/85) munmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") add_key(&(0x7f00000001c0)='logon\x00', &(0x7f0000000280), &(0x7f0000000180), 0x0, 0xfffffffffffffffc) syz_execute_func(&(0x7f0000000500)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefac462f19de55dc4617d2b231a010d64ac1e5d31a3b786e2989f7f") 03:35:09 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000640)=@file={0x0, './file0\x00'}, 0x6e) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @remote}, &(0x7f0000000180)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in=@multicast1, @in6=@loopback}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000500), &(0x7f0000000540), 0x0, 0xfffffffffffffff9) add_key(&(0x7f0000000740)='keyring\x00', &(0x7f0000000780), &(0x7f00000007c0), 0x0, 0xfffffffffffffff8) keyctl$instantiate(0xc, 0x0, &(0x7f0000000980), 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="428055a06b6969ef69dc00d99069203637c3397c2a060f38211a40a564a741dfe0400f01efe5e57d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:35:09 executing program 0: getrandom(&(0x7f0000000200)=""/148, 0x340, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), 0x4) getresuid(&(0x7f00000000c0), &(0x7f0000000200), &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b000002c42111c25d0b72383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f56") 03:35:09 executing program 4: pselect6(0x40, &(0x7f0000000740), &(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000880)={&(0x7f0000000840), 0x8}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x40000000006, 0x0, 0x0, 0x58fe4}]}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000080)='trusted.overlay.origin\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000200), 0x10) syz_execute_func(&(0x7f0000000140)="42805da0320fef69dc0f01eece73fe19fa380f38211af3f242d2be00000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) 03:35:09 executing program 5: gettid() ioprio_set$uid(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:10 executing program 3: keyctl$set_reqkey_keyring(0x2, 0x0) pipe(&(0x7f00000001c0)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) gettid() lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) getegid() getpid() syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:35:10 executing program 1: sysinfo(&(0x7f0000000380)=""/4096) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000280)=""/212, &(0x7f0000001380)=0xd4) pipe(&(0x7f00000013c0)) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000018c0)={{{@in=@remote, @in=@broadcast}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f0000001480)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000019c0)={'veth1_to_team\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001a40)={{{@in=@local, @in6=@loopback}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000001b40)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001d00)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001d40)={@broadcast, @local}, &(0x7f0000001d80)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040), &(0x7f0000001e00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001e40)={@dev}, &(0x7f0000001e80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002500)={'ipddp0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002540)={@mcast1}, &(0x7f0000002580)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000025c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002600)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000002640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002680)=0x14, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000026c0)={'veth0_to_team\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000003980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000039c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001a00), &(0x7f0000003a40)=0x5) getpeername$packet(0xffffffffffffffff, &(0x7f0000003a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003ac0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003b00)={0x0, @rand_addr, @rand_addr}, &(0x7f0000003b40)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003b80)={{{@in6=@dev}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000003c80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003cc0)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003d00)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000003e00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003e40)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f0000003f40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000003f80), &(0x7f0000003fc0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000004000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000004040)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004080)={0x0, @empty, @multicast2}, &(0x7f00000040c0)=0xc) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000004a40)={&(0x7f00000000c0), 0xc, &(0x7f0000004a00)={&(0x7f0000004100)={0x14}, 0x14}}, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000140)) getresuid(&(0x7f00000014c0), &(0x7f0000001500), &(0x7f0000001540)) getresuid(&(0x7f0000001580), &(0x7f00000015c0), &(0x7f0000001600)) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:35:10 executing program 0: getrandom(&(0x7f0000000200)=""/148, 0x340, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), 0x4) getresuid(&(0x7f00000000c0), &(0x7f0000000200), &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b000002c42111c25d0b72383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f56") 03:35:10 executing program 2: mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="428055a0876969ef69dc00d990c8414dff0f0f37370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080), &(0x7f0000000140), 0x0, 0xffffffffffffffff) keyctl$setperm(0x5, 0x0, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000300)={'vlan0\x00'}) pipe(&(0x7f00000001c0)) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000380)={0x18}, 0x18) open$dir(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) pipe(&(0x7f0000000240)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) shmctl$SHM_STAT(0x0, 0xd, &(0x7f00000004c0)=""/154) mmap(&(0x7f00001ed000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000580)=""/182) bind$inet(0xffffffffffffffff, &(0x7f0000942000)={0x2, 0x0, @multicast1}, 0x10) setpgid(0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f00001ed000/0x2000)=nil, 0x2000}, &(0x7f00000002c0)=0x10) write$P9_RGETLOCK(0xffffffffffffffff, &(0x7f0000000380)=ANY=[], 0x0) fstat(0xffffffffffffffff, &(0x7f0000000140)) 03:35:10 executing program 4: socket$inet6_icmp_raw(0x2, 0x3, 0x3a) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000740)={0x0, &(0x7f00000004c0)}, 0x10) clock_gettime(0x0, &(0x7f00000000c0)) keyctl$set_reqkey_keyring(0x7, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000300), &(0x7f0000000480)=0x18) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000580)=""/252) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000380)=""/196) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000280)) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) syz_execute_func(&(0x7f0000000500)="1cd2805da0616969692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9c81ceefa6be27973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90df55b498985fc3") 03:35:10 executing program 5: gettid() ioprio_set$uid(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:11 executing program 3: prctl$setname(0xf, &(0x7f0000000040)='bdevselfcgroupself') openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) request_key(&(0x7f0000000400)='id_legacy\x00', &(0x7f0000000440), &(0x7f0000000480)='/dev/zero\x00', 0xfffffffffffffffe) lseek(0xffffffffffffffff, 0x0, 0x0) add_key(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500), &(0x7f0000000540), 0x0, 0xfffffffffffffff9) keyctl$link(0x8, 0x0, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0ab878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000001c0)) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000200), 0x12) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000140)) ioctl$EVIOCSABS3F(0xffffffffffffffff, 0x401845ff, &(0x7f0000000540)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000002c0)=""/245, 0xf5}) 03:35:11 executing program 1: mmap(&(0x7f0000600000/0x4000)=nil, 0x4000, 0x0, 0x44031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x200031, 0xffffffffffffffff, 0x0) 03:35:11 executing program 1: keyctl$set_reqkey_keyring(0x3, 0x0) pipe(&(0x7f00000001c0)) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f0000000280)) setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, &(0x7f00000007c0), 0x4) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000780)={0x18}, 0x18) open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000680)) getpgid(0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000640)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) 03:35:11 executing program 2: unshare(0x0) getpid() fcntl$getown(0xffffffffffffff9c, 0x9) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000b80)='cgroup.subtree_control\x00', 0x2, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/ptmx\x00', 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000006c0)='trusted.overlay.origin\x00', &(0x7f00000007c0)='y\x00', 0x2, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) stat(&(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000c00)) syz_execute_func(&(0x7f0000001d40)="428055a0866969ef69dc00d93e3e3e660f381ecaa71837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000200)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000000300)=0xe8) stat(&(0x7f0000000340)='./file0\x00', &(0x7f00000003c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000980)=0xe8) stat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000a40)) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000c80)=""/4096, &(0x7f0000000b40)=0x1000) setfsgid(0x0) openat(0xffffffffffffffff, &(0x7f0000000540)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000740)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000580), &(0x7f00000005c0)=0xc) memfd_create(&(0x7f0000000b00)="040094000000000000", 0x0) 03:35:11 executing program 0: getrandom(&(0x7f0000000200)=""/148, 0x340, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), 0x4) getresuid(&(0x7f00000000c0), &(0x7f0000000200), &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b000002c42111c25d0b72383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f56") 03:35:11 executing program 5: gettid() ioprio_set$uid(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:11 executing program 4: mlock2(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='-$\x00', 0xffffffffffffff9c}, 0x10) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) munmap(&(0x7f0000005000/0x3000)=nil, 0x3000) open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000340), &(0x7f00000003c0)=0x68) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000440)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:35:12 executing program 3: request_key(&(0x7f0000000140)='id_legacy\x00', &(0x7f0000000180), &(0x7f00000001c0)='\x00', 0xfffffffffffffff9) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) seccomp(0x0, 0x0, &(0x7f0000000100)) prctl$void(0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000600)='/dev/hwrng\x00', 0x0, 0x0) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000880)={{{@in6, @in6=@ipv4}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0xe8) stat(&(0x7f00000005c0)='./file1\x00', &(0x7f0000000980)) gettid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) fstat(0xffffffffffffffff, &(0x7f0000000cc0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000d40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d80)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000000e80)=0xe8) stat(&(0x7f0000000ec0)='./file0\x00', &(0x7f0000000f00)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) stat(&(0x7f0000000fc0)='./file0\x00', &(0x7f0000001000)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001080), &(0x7f00000010c0)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001100)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001140)={{{@in6=@loopback, @in6=@mcast2}}, {{}, 0x0, @in6}}, &(0x7f0000001240)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000012c0), &(0x7f0000001300)=0xc) getpid() lstat(&(0x7f00000015c0)='./file2\x00', &(0x7f0000001600)) lstat(&(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001740)) lstat(&(0x7f0000001780)='./file2\x00', &(0x7f00000017c0)) lstat(&(0x7f0000001840)='./file0/file0\x00', &(0x7f0000001880)) gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001b40)={{{@in=@remote, @in=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000001c40)=0xe8) stat(&(0x7f0000001c80)='./file1\x00', &(0x7f0000001cc0)) getpid() fstat(0xffffffffffffffff, &(0x7f0000001d40)) fstat(0xffffffffffffffff, &(0x7f0000001dc0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001f00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:35:12 executing program 0: clock_gettime(0x3, &(0x7f00000002c0)) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000040), 0xa) semget$private(0x0, 0x0, 0x0) semtimedop(0x0, &(0x7f0000000200), 0x0, 0xfffffffffffffffe) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300)={0x0, 0x989680}, &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rfkill\x00', 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000580), 0x0, 0x0, 0x0, 0x0) add_key(&(0x7f0000000680)='logon\x00', &(0x7f00000006c0), &(0x7f0000000700), 0x0, 0xfffffffffffffff9) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f0000000140)="66baf80cb850967d88ef66bafc0cec0f20e035000001000f22e066b8c0008ec8b88000c0fe0f23d00f21f835000000030f23f80f060f20c035200000000f22c0b9800000c00f3235002000000f3065660f54b400f49700002665f0085d06263e0f01f6", 0x63}], 0x1, 0x0, &(0x7f0000000280), 0x0) clock_gettime(0x0, &(0x7f0000000800)) futimesat(0xffffffffffffffff, &(0x7f00000007c0)='./file0\x00', &(0x7f0000000840)={{0x77359400}}) keyctl$get_keyring_id(0x0, 0x0, 0x0) getgroups(0x0, &(0x7f0000000280)) fstat(0xffffffffffffffff, &(0x7f0000000340)) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)) getegid() getgroups(0x0, &(0x7f0000000580)) getgid() lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getgroups(0x0, &(0x7f0000000780)) syz_open_dev$dspn(&(0x7f0000000440)='/dev/dsp#\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(0xffffffffffffffff, 0x4008af22, &(0x7f0000000480)) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 03:35:12 executing program 1: munmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000400)) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f00000004c0), &(0x7f0000000500)=0x4) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000380)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000140)={{0x77359400}, {0x77359400}}, &(0x7f00000000c0)) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, &(0x7f00000003c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000640)) fstat(0xffffffffffffffff, &(0x7f0000000240)) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000880)) getpgid(0xffffffffffffffff) getresuid(&(0x7f0000000900), &(0x7f0000000540), &(0x7f0000000600)) fstat(0xffffffffffffffff, &(0x7f00000009c0)) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001340), 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in6=@dev, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000000840)=0xe8) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x58de4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000440), &(0x7f0000000480)=0x4) readv(0xffffffffffffffff, &(0x7f0000000000), 0x0) 03:35:12 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000b39000)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000b0bf74)={0x0, 0x0, 0x0, 'queue0\x00'}) r1 = memfd_create(&(0x7f000003e000)='\'', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000d82000)='/dev/snd/seq\x00', 0x0, 0x8000000040102) dup2(r2, r1) write$sndseq(r1, &(0x7f0000e6ffd0)=[{0x1e, 0x0, 0x0, 0x3fd, @time}], 0x30) 03:35:12 executing program 5: gettid() ioprio_set$uid(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:12 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000b39000)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000b0bf74)={0x0, 0x0, 0x0, 'queue0\x00'}) r1 = memfd_create(&(0x7f000003e000)='\'', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000d82000)='/dev/snd/seq\x00', 0x0, 0x8000000040102) dup2(r2, r1) write$sndseq(r1, &(0x7f0000e6ffd0)=[{0x1e, 0x0, 0x0, 0x3fd, @time}], 0x30) 03:35:12 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000b39000)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000b0bf74)={0x0, 0x0, 0x0, 'queue0\x00'}) r1 = memfd_create(&(0x7f000003e000)='\'', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000d82000)='/dev/snd/seq\x00', 0x0, 0x8000000040102) dup2(r2, r1) write$sndseq(r1, &(0x7f0000e6ffd0)=[{0x1e, 0x0, 0x0, 0x3fd, @time}], 0x30) 03:35:12 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000b39000)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000b0bf74)={0x0, 0x0, 0x0, 'queue0\x00'}) r1 = memfd_create(&(0x7f000003e000)='\'', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000d82000)='/dev/snd/seq\x00', 0x0, 0x8000000040102) dup2(r2, r1) write$sndseq(r1, &(0x7f0000e6ffd0)=[{0x1e, 0x0, 0x0, 0x3fd, @time}], 0x30) 03:35:13 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000b39000)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000b0bf74)={0x0, 0x0, 0x0, 'queue0\x00'}) r1 = memfd_create(&(0x7f000003e000)='\'', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000d82000)='/dev/snd/seq\x00', 0x0, 0x8000000040102) dup2(r2, r1) write$sndseq(r1, &(0x7f0000e6ffd0)=[{0x1e, 0x0, 0x0, 0x3fd, @time}], 0x30) 03:35:13 executing program 3: setpriority(0x2, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_all\x00', 0x0, 0x0) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000016c0)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0802403088e9fc421f97087b90000000f7fb3dffbc941") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f00000000c0)) getpid() ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000040)) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000140)) getegid() getresgid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) getgid() getegid() stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) getgid() lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)) getgid() syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6, @in=@rand_addr}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in6, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f0000000840)=0xe8) accept(0xffffffffffffffff, &(0x7f0000000cc0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000d40)=0x80) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000e40)={{{@in=@broadcast, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f0000000f40)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000f80)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000fc0)={@remote}, &(0x7f0000001000)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000001040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001080)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002740)={@broadcast, @multicast1}, &(0x7f0000002780)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f00000027c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002800)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002840)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000028c0)={{{@in=@loopback, @in=@multicast2}}, {{@in6}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000029c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002a00)={{{@in6=@dev, @in6}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000002b00)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000002b40), &(0x7f0000002b80)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000002bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002c00)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002c40)={{{@in6=@remote, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f00000005c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002d80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002dc0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002e00)={0x0, @dev, @loopback}, &(0x7f0000002e40)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002e80)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002ec0)={{{@in=@local, @in6=@local}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000002fc0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003000)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003040)={{{@in=@broadcast, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f0000003140)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003240)={@broadcast, @multicast2}, &(0x7f0000003280)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000032c0)={'rose0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003300)={'yam0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003340)={'teql0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003380)={'team0\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003cc0)={&(0x7f0000000540), 0xc, &(0x7f0000003c80)={&(0x7f00000033c0)={0x14}, 0x14}}, 0x0) getgroups(0x0, &(0x7f0000000500)) 03:35:13 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000b39000)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000b0bf74)={0x0, 0x0, 0x0, 'queue0\x00'}) r1 = memfd_create(&(0x7f000003e000)='\'', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000d82000)='/dev/snd/seq\x00', 0x0, 0x8000000040102) dup2(r2, r1) write$sndseq(r1, &(0x7f0000e6ffd0)=[{0x1e, 0x0, 0x0, 0x3fd, @time}], 0x30) 03:35:13 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000003c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x8005001f, 0x0, 0x0, 0x28, 0x0, 0x6500}) ioctl$KVM_TRANSLATE(r3, 0x4138ae84, &(0x7f00000001c0)) 03:35:13 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000b39000)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000b0bf74)={0x0, 0x0, 0x0, 'queue0\x00'}) r1 = memfd_create(&(0x7f000003e000)='\'', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000d82000)='/dev/snd/seq\x00', 0x0, 0x8000000040102) dup2(r2, r1) write$sndseq(r1, &(0x7f0000e6ffd0)=[{0x1e, 0x0, 0x0, 0x3fd, @time}], 0x30) 03:35:13 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0xc, 0x2009, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f00000000c0)}, 0x20) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000040)) connect$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @multicast2}, 0x10) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000880)={{{@in=@dev, @in6=@mcast2}}, {{@in6}, 0x0, @in6=@mcast1}}, &(0x7f0000000980)=0xe8) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) gettid() geteuid() getgroups(0x0, &(0x7f0000000a80)) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000ac0)={{{@in=@loopback, @in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f0000000bc0)=0xe8) getresgid(&(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001640)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001680), &(0x7f00000016c0)=0xc) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001700)) fstat(0xffffffffffffffff, &(0x7f0000001740)) getegid() fcntl$getown(0xffffffffffffffff, 0x9) getuid() lstat(&(0x7f0000001cc0)='./file0\x00', &(0x7f0000001d00)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001d80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001dc0), &(0x7f0000001e00)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001e40), &(0x7f0000001e80)=0xc) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000001ec0)) getgid() getpgid(0x0) geteuid() lstat(&(0x7f0000001f80)='./file0\x00', &(0x7f0000001fc0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002040)) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002080), &(0x7f00000020c0)=0xc) getpid() geteuid() lstat(&(0x7f0000002100)='./file0\x00', &(0x7f0000002140)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002200)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000021c0)='@cgroup\x00'}, 0x30) getresuid(&(0x7f0000002240), &(0x7f0000002280), &(0x7f00000022c0)) getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000026c0)) geteuid() getgroups(0x0, &(0x7f0000002700)) getpgid(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002740)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in=@rand_addr}}}, &(0x7f0000002840)=0xe8) stat(&(0x7f0000002880)='./file0\x00', &(0x7f00000028c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002940)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002980), &(0x7f00000029c0)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002a00)) fstat(0xffffffffffffffff, &(0x7f0000002a40)) getgroups(0x0, &(0x7f0000002ac0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002b00)) getresuid(&(0x7f0000002b40), &(0x7f0000002b80), &(0x7f0000002bc0)) fstat(0xffffffffffffffff, &(0x7f0000002c00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002c80)) getuid() getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003780)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000003740)='cgroup.type\x00'}, 0x30) getuid() getegid() gettid() geteuid() stat(&(0x7f00000037c0)='./file0\x00', &(0x7f0000003800)) getpid() stat(&(0x7f0000003880)='./file0\x00', &(0x7f00000038c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003940), &(0x7f0000003980)=0xc) getpid() getresuid(&(0x7f00000039c0), &(0x7f0000003a00), &(0x7f0000003a40)) getresgid(&(0x7f0000003a80), &(0x7f0000003ac0), &(0x7f0000003b00)) getpgid(0x0) geteuid() fstat(0xffffffffffffffff, &(0x7f0000003d40)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003dc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000003e00)={{{@in=@loopback, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000003f00)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:13 executing program 5: add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000700), 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000780)='id_legacy\x00', &(0x7f00000007c0), &(0x7f0000000800)='\x00', 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:13 executing program 1: sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x2000000008}, 0x1c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e1f, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x400000000000027, 0x0) 03:35:13 executing program 2: syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x1000000000000, 0x202002) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000080)={0x0, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) ioctl$sock_bt_hidp_HIDPGETCONNLIST(0xffffffffffffffff, 0x800448d2, &(0x7f0000000240)={0x0, &(0x7f0000000440)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") syz_genetlink_get_family_id$nbd(&(0x7f0000000180)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[]}}, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000380)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'team_slave_1\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000540)={{{@in=@rand_addr, @in=@multicast1}}, {{@in6=@mcast1}}}, &(0x7f0000000400)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000740)={@remote}, &(0x7f0000000780)=0x14) 03:35:13 executing program 4: openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x101000, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000004c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000080)) msgget$private(0x0, 0x0) syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000180)={0x0, &(0x7f0000000140)}) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000140)) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:35:13 executing program 1: sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x2000000008}, 0x1c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e1f, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x400000000000027, 0x0) 03:35:14 executing program 3: setpriority(0x2, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_all\x00', 0x0, 0x0) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000016c0)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0802403088e9fc421f97087b90000000f7fb3dffbc941") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f00000000c0)) getpid() ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000040)) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000140)) getegid() getresgid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) getgid() getegid() stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) getgid() lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)) getgid() syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6, @in=@rand_addr}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in6, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f0000000840)=0xe8) accept(0xffffffffffffffff, &(0x7f0000000cc0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000d40)=0x80) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000e40)={{{@in=@broadcast, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f0000000f40)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000f80)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000fc0)={@remote}, &(0x7f0000001000)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000001040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001080)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002740)={@broadcast, @multicast1}, &(0x7f0000002780)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f00000027c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002800)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002840)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000028c0)={{{@in=@loopback, @in=@multicast2}}, {{@in6}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000029c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002a00)={{{@in6=@dev, @in6}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000002b00)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000002b40), &(0x7f0000002b80)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000002bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002c00)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002c40)={{{@in6=@remote, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f00000005c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002d80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002dc0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002e00)={0x0, @dev, @loopback}, &(0x7f0000002e40)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002e80)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002ec0)={{{@in=@local, @in6=@local}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000002fc0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003000)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003040)={{{@in=@broadcast, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f0000003140)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003240)={@broadcast, @multicast2}, &(0x7f0000003280)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000032c0)={'rose0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003300)={'yam0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003340)={'teql0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003380)={'team0\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003cc0)={&(0x7f0000000540), 0xc, &(0x7f0000003c80)={&(0x7f00000033c0)={0x14}, 0x14}}, 0x0) getgroups(0x0, &(0x7f0000000500)) 03:35:14 executing program 1: sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x2000000008}, 0x1c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e1f, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x400000000000027, 0x0) 03:35:14 executing program 1: sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x2000000008}, 0x1c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e1f, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x400000000000027, 0x0) 03:35:14 executing program 2: prctl$intptr(0x1f, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) sched_setparam(0x0, &(0x7f0000000040)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x0, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) 03:35:14 executing program 0: getpgid(0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') getpid() fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000240)) memfd_create(&(0x7f0000000040)='(@.\x00', 0x0) creat(&(0x7f0000000740)='./file0\x00', 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000c80)) timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000180)) getpgrp(0xffffffffffffffff) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000002c0)='eql\x00') openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") delete_module(&(0x7f00000001c0)='team\x00', 0x0) geteuid() getgid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in6=@local, @in6}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000a80)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000000600)=0x252) getuid() lstat(&(0x7f0000000b40)='./file1\x00', &(0x7f0000000b80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001cc0)={{{@in6=@mcast1, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000c00)=0xe8) getgid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in, @in=@local}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in=@rand_addr}}, &(0x7f0000002200)=0xe8) getresgid(&(0x7f0000002240), &(0x7f0000002280), &(0x7f00000022c0)) stat(&(0x7f0000002300)='./file0\x00', &(0x7f0000002340)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000023c0), &(0x7f0000002400)=0xc) geteuid() fstat(0xffffffffffffffff, &(0x7f0000002440)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003840), &(0x7f0000003880)=0xfffffffffffffe25) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000038c0)={{{@in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f00000039c0)=0xe8) getgid() stat(&(0x7f0000004d40)='./file0\x00', &(0x7f0000004d80)) getgroups(0x0, &(0x7f0000004e00)) getuid() getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004e40), &(0x7f0000004e80)=0xc) getgid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000005100)={{{@in6=@local, @in6=@mcast1}}, {{@in=@loopback}, 0x0, @in=@dev}}, &(0x7f0000005200)=0xe8) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000005240)={{{@in6=@loopback, @in6}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000005340)=0xe8) getgid() fstat(0xffffffffffffffff, &(0x7f0000005380)) getresgid(&(0x7f0000005400), &(0x7f0000005440), &(0x7f0000005480)) getresuid(&(0x7f00000054c0), &(0x7f0000005500), &(0x7f0000005540)) getgroups(0x0, &(0x7f0000005580)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000055c0)={{{@in=@multicast2, @in=@broadcast}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f00000056c0)=0xe8) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:14 executing program 5: keyctl$set_reqkey_keyring(0xa, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000540)={&(0x7f0000000400)='./file0\x00'}, 0x10) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)}}, 0x20) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb, &(0x7f0000001d00)='/dev/vsock\x00', 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000001d80)='./file0/file0\x00', &(0x7f0000001dc0)) getegid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) lstat(&(0x7f0000002980)='./file0\x00', &(0x7f00000029c0)) stat(&(0x7f0000002a40)='./file0\x00', &(0x7f0000002a80)) getpgrp(0x0) getresuid(&(0x7f0000002b00), &(0x7f0000002b40), &(0x7f0000002b80)) getgid() getpid() geteuid() fstat(0xffffffffffffffff, &(0x7f0000002bc0)) getpgrp(0x0) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003040), &(0x7f0000003080)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000036c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003700)={{{@in=@loopback, @in=@rand_addr}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000003800)=0xe8) lstat(&(0x7f0000003840)='./file0\x00', &(0x7f0000003880)) gettid() fstat(0xffffffffffffffff, &(0x7f0000003900)) fstat(0xffffffffffffffff, &(0x7f0000003980)) stat(&(0x7f0000003a80)='./file1\x00', &(0x7f0000003ac0)) fstat(0xffffffffffffffff, &(0x7f0000003b40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000003bc0)) 03:35:14 executing program 4: pipe(&(0x7f0000000140)) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f0000000240)) semget$private(0x0, 0x0, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x10, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000180)="81", 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="f5428055a0727269ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5c4015dd8144af2ed2e1a1a3ef0f6585aab550101a3b786e298edc4227992749f55") 03:35:15 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) ppoll(&(0x7f0000001280)=[{r1}, {r0}], 0x2, &(0x7f00000012c0)={0x0, 0x989680}, &(0x7f0000001300), 0x8) 03:35:15 executing program 0: utimes(&(0x7f0000000080)='./file1\x00', &(0x7f0000000240)={{0x0, 0x7530}, {0x0, 0x7530}}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001500)) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=ANY=[]) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="428055a0636969ef69dc00d9907c2a0f0fcdae300f38211a40a5450f8d0e00000041dfe0400f01efe5e57d0fecec1a1a01460f01a0eeeea3b7c6e298c48171683403") sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) personality(0x0) mkdir(&(0x7f000002b000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) open$dir(&(0x7f0000eb6000)='./file0/bus\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000180)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @remote}}, 0x5c) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000480), 0x4) getsockname$unix(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000440)=0x6e) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000300)) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) geteuid() lstat(&(0x7f0000000500)='./file1\x00', &(0x7f0000000540)) getgid() lstat(&(0x7f00000005c0)='./file1\x00', &(0x7f0000000600)) getgroups(0x0, &(0x7f0000000680)) getgroups(0x0, &(0x7f00000006c0)) getgid() getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) lstat(&(0x7f0000000840)='./file1\x00', &(0x7f0000000880)) stat(&(0x7f0000000900)='\x00', &(0x7f0000000940)) getgid() lsetxattr$system_posix_acl(&(0x7f0000000200)='./file0/bus\x00', &(0x7f00000004c0)='system.posix_acl_access\x00', &(0x7f00000009c0), 0x24, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) lstat(&(0x7f0000000140)='./file1\x00', &(0x7f0000000340)) 03:35:15 executing program 1: socket$inet(0x2, 0x3ffffffffffffffd, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)) openat$audio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/audio\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f0000000200), 0x4) accept$inet(0xffffffffffffffff, 0x0, &(0x7f0000000080)) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000180), &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x10) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={@multicast1, @empty, @rand_addr}, 0xc) syz_genetlink_get_family_id$nbd(&(0x7f0000000300)='nbd\x00') sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000140), 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14}, 0x14}}, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000980), 0x4) sendto$inet(0xffffffffffffffff, &(0x7f0000a88f88), 0x29f, 0x0, &(0x7f0000e68000)={0x2, 0x0, @loopback}, 0x10) 03:35:15 executing program 3: setpriority(0x2, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_all\x00', 0x0, 0x0) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000016c0)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0802403088e9fc421f97087b90000000f7fb3dffbc941") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f00000000c0)) getpid() ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000040)) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000140)) getegid() getresgid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) getgid() getegid() stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) getgid() lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)) getgid() syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6, @in=@rand_addr}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in6, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f0000000840)=0xe8) accept(0xffffffffffffffff, &(0x7f0000000cc0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000d40)=0x80) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000e40)={{{@in=@broadcast, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f0000000f40)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000f80)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000fc0)={@remote}, &(0x7f0000001000)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000001040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001080)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002740)={@broadcast, @multicast1}, &(0x7f0000002780)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f00000027c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002800)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002840)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000028c0)={{{@in=@loopback, @in=@multicast2}}, {{@in6}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000029c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002a00)={{{@in6=@dev, @in6}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000002b00)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000002b40), &(0x7f0000002b80)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000002bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002c00)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002c40)={{{@in6=@remote, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f00000005c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002d80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002dc0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002e00)={0x0, @dev, @loopback}, &(0x7f0000002e40)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002e80)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002ec0)={{{@in=@local, @in6=@local}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000002fc0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003000)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003040)={{{@in=@broadcast, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f0000003140)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003240)={@broadcast, @multicast2}, &(0x7f0000003280)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000032c0)={'rose0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003300)={'yam0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003340)={'teql0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003380)={'team0\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003cc0)={&(0x7f0000000540), 0xc, &(0x7f0000003c80)={&(0x7f00000033c0)={0x14}, 0x14}}, 0x0) getgroups(0x0, &(0x7f0000000500)) 03:35:15 executing program 2: capget(&(0x7f00000000c0), &(0x7f00000001c0)) keyctl$set_reqkey_keyring(0x7, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) openat(0xffffffffffffffff, &(0x7f0000002840)='./file0\x00', 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:15 executing program 5: keyctl$set_reqkey_keyring(0x7, 0xb000400) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000180)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200), &(0x7f0000000240), 0x0, 0xfffffffffffffffa) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000002c0)={{{@in, @in=@local}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f00000003c0)=0xe8) getgroups(0x0, &(0x7f0000000400)) keyctl$chown(0x4, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000040)) socket$inet6(0xa, 0x0, 0x0) 03:35:15 executing program 4: shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000240)=""/228) 03:35:15 executing program 4: shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000240)=""/228) 03:35:15 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) getsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x4, &(0x7f0000000000), &(0x7f0000000040)=0x2c) 03:35:16 executing program 1: madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1f) pipe2(&(0x7f0000000280), 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000005c0), 0xc, &(0x7f00000007c0)={&(0x7f00000001c0)=ANY=[]}}, 0x0) restart_syscall() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@empty, @local, @dev}, &(0x7f0000000180)=0xc) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) memfd_create(&(0x7f00000001c0)='.\x00', 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000200)) rt_sigpending(&(0x7f0000000080), 0x8) socket$inet6(0xa, 0x0, 0x0) io_setup(0x0, &(0x7f0000000240)) syz_genetlink_get_family_id$team(&(0x7f0000000440)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000940)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001280)={{{@in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f0000001380)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000013c0)={{{@in6=@local, @in6=@mcast2}}, {{@in6}}}, &(0x7f00000014c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000a00)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001580)={@broadcast, @broadcast}, &(0x7f00000015c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c00)={{{@in=@loopback, @in=@dev}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@remote}}, &(0x7f0000000a80)=0xffffffffffffff1b) accept4$packet(0xffffffffffffffff, &(0x7f0000001740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001780)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000880)={@local, @dev}, &(0x7f0000000a40)=0x6d0fa773ca4a6d0a) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001840)={0x0, @loopback, @multicast1}, &(0x7f0000001880)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000018c0)={0x0, @remote, @rand_addr}, &(0x7f0000001900)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001980)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002100)={@rand_addr}, &(0x7f0000002140)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002600)={0x0, @multicast1}, &(0x7f0000002640)=0xc) accept4(0xffffffffffffffff, &(0x7f0000004300)=@can, &(0x7f0000004380)=0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f000000ad00), 0x0, 0x0, &(0x7f000000aec0)={0x0, 0x989680}) getpeername(0xffffffffffffffff, &(0x7f000000af00)=@xdp, &(0x7f000000af80)=0x80) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000b00)={{{@in=@dev, @in6=@dev}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xfffffffffffffe99) recvmsg(0xffffffffffffffff, &(0x7f000000c540)={&(0x7f000000b300)=@hci, 0x80, &(0x7f000000c440), 0x0, &(0x7f000000c480)=""/151, 0x97}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f000000c640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000c680)=0x14) accept4(0xffffffffffffffff, &(0x7f000000e080)=@xdp, &(0x7f000000e100)=0x80, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000e140)={@empty, @multicast2}, &(0x7f000000e180)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000e1c0)={{{@in=@loopback, @in6=@loopback}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@mcast1}}, &(0x7f000000e2c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000e300)={{{@in=@multicast2, @in=@remote}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f000000e400)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000e500), &(0x7f000000e540)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000e800)={'bcsh0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000e840)={'ip6tnl0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000e980)={{{@in6=@local, @in=@dev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f000000ea80)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000f6c0)={&(0x7f0000000400), 0xc, &(0x7f000000f680)={&(0x7f0000002680)=ANY=[]}}, 0x0) signalfd(0xffffffffffffff9c, &(0x7f0000000380), 0x8) ustat(0x0, &(0x7f0000000780)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000480)) rt_sigaction(0x0, &(0x7f0000000140)={&(0x7f0000000040)="4276c8c461fc576fc08fe9a893e9c402d0f34b756745ccf242aed30dfeefffff36e300dacb660f1bb008000000", {}, 0x0, &(0x7f00000000c0)="c443d148a38d000000fe2626660f62e2c4c201397f056426c065000ec462a99be8366536de494bc481a25d670fc4416de4b800000000660f38dbe726430f6be1"}, 0x0, 0x8, &(0x7f0000000180)) request_key(&(0x7f0000000300)='encrypted\x00', &(0x7f0000000340), &(0x7f00000003c0)='.\x00', 0xfffffffffffffffd) syz_execute_func(&(0x7f0000000980)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:16 executing program 4: shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000240)=""/228) 03:35:16 executing program 0: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") r1 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r2 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240)}}], 0x0, 0x0, &(0x7f00000003c0)}) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000080)=[@enter_looper], 0x48, 0x0, &(0x7f0000000480)="f27aec438116cefc2a394072b6ad8809e53ac6553db7f225a4e47722a00ba8846454ad779316094e4bee8cab76761555d3676404fb3c728f045f7d9ecc9b2662539500d7df7d1802"}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000005c0)={0x4c, 0x0, &(0x7f0000000380)=[@reply_sg={0x40486312, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040), &(0x7f00000000c0)}}}], 0x0, 0x0, &(0x7f0000000500)}) 03:35:16 executing program 3: setpriority(0x2, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_all\x00', 0x0, 0x0) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000016c0)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0802403088e9fc421f97087b90000000f7fb3dffbc941") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f00000000c0)) getpid() ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000040)) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000140)) getegid() getresgid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) getgid() getegid() stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) getgid() lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)) getgid() syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6, @in=@rand_addr}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in6, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f0000000840)=0xe8) accept(0xffffffffffffffff, &(0x7f0000000cc0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000d40)=0x80) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000e40)={{{@in=@broadcast, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f0000000f40)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000f80)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000fc0)={@remote}, &(0x7f0000001000)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000001040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001080)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002740)={@broadcast, @multicast1}, &(0x7f0000002780)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f00000027c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002800)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002840)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000028c0)={{{@in=@loopback, @in=@multicast2}}, {{@in6}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000029c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002a00)={{{@in6=@dev, @in6}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000002b00)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000002b40), &(0x7f0000002b80)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000002bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002c00)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002c40)={{{@in6=@remote, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f00000005c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002d80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002dc0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002e00)={0x0, @dev, @loopback}, &(0x7f0000002e40)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002e80)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002ec0)={{{@in=@local, @in6=@local}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000002fc0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003000)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003040)={{{@in=@broadcast, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f0000003140)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003240)={@broadcast, @multicast2}, &(0x7f0000003280)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000032c0)={'rose0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003300)={'yam0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003340)={'teql0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003380)={'team0\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003cc0)={&(0x7f0000000540), 0xc, &(0x7f0000003c80)={&(0x7f00000033c0)={0x14}, 0x14}}, 0x0) getgroups(0x0, &(0x7f0000000500)) 03:35:16 executing program 4: shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000240)=""/228) [ 956.353392] binder: 27279:27280 got reply transaction with bad transaction stack, transaction 16 has target 27279:27280 [ 956.426956] binder: 27279:27280 transaction failed 29201/-71, size 0-0 line 2756 03:35:16 executing program 4: ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) seccomp(0x0, 0x0, &(0x7f0000000100)) mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) request_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080), &(0x7f0000000140)="252d6370757365745c1b00", 0xfffffffffffffffc) futex(&(0x7f0000000500), 0x0, 0x0, &(0x7f0000000880)={0x0, 0x989680}, &(0x7f0000000300), 0x0) syz_genetlink_get_family_id$team(&(0x7f00000005c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000480)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000580)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000001000), 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000001180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000011c0)=0x14, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001240)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000006e80)={@remote}, &(0x7f0000006ec0)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000007040), 0x0, 0x0, &(0x7f0000007080)={0x77359400}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007180)={{{@in=@remote, @in=@multicast2}}, {{@in=@dev}, 0x0, @in=@remote}}, &(0x7f0000007280)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000072c0)={{{@in=@local}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f00000073c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000007580)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000075c0)={{{@in=@local, @in6=@loopback}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000076c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007700)={@mcast1}, &(0x7f0000007740)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007780)={{{@in=@remote, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000007880)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000007cc0)={{{@in=@rand_addr}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000007dc0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000007ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007f00)=0x14, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000007f40)={'erspan0\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008540)={&(0x7f0000000340), 0xc, &(0x7f0000008500)={&(0x7f0000007f80)={0x14}, 0x14}}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) eventfd(0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000000c0)) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)) getpgid(0x0) syz_open_dev$binder(&(0x7f0000000240)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000400)='children\x00') seccomp(0x0, 0x0, &(0x7f0000000100)) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='security.capability\x00') dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000180), 0xc) syz_execute_func(&(0x7f00000003c0)="42805da0120fef69dc0f58eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") [ 956.471018] binder_alloc: binder_alloc_mmap_handler: 27279 20001000-20004000 already mapped failed -16 [ 956.532063] binder: BINDER_SET_CONTEXT_MGR already set [ 956.561536] binder: 27279:27280 ioctl 40046207 0 returned -16 [ 956.578953] binder_alloc: 27279: binder_alloc_buf, no vma [ 956.593172] binder: 27279:27295 got reply transaction with no transaction stack [ 956.614759] binder: 27279:27292 transaction failed 29189/-3, size 0-0 line 2973 03:35:16 executing program 2: mremap(&(0x7f0000fff000/0x1000)=nil, 0x20000000, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)) getegid() lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f00000005c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000540)=0xc) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getgroups(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe3}]}) syz_execute_func(&(0x7f0000000240)="42805da0124fefeddc0f01eea873fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") [ 956.649848] binder: release 27279:27280 transaction 16 out, still active [ 956.657996] binder: 27279:27295 transaction failed 29201/-71, size 0-0 line 2741 [ 956.670774] binder: undelivered TRANSACTION_COMPLETE [ 956.690880] binder: undelivered TRANSACTION_ERROR: 29201 [ 956.715104] binder: undelivered TRANSACTION_ERROR: 29189 [ 956.737841] binder: undelivered TRANSACTION_ERROR: 29201 03:35:16 executing program 0: fanotify_init(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") [ 956.759860] binder: release 27279:27280 transaction 16 in, still active 03:35:16 executing program 5: gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000080)='team0\x00'}, 0x30) getpgid(0x0) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000480)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000500)) getpid() getpgrp(0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000003c0)) getpgrp(0xffffffffffffffff) getpgid(0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') getpid() fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000240)) memfd_create(&(0x7f0000000040)='(@.\x00', 0x0) creat(&(0x7f0000000740)='./file0\x00', 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000c80)) timerfd_create(0x0, 0x0) getpgrp(0xffffffffffffffff) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000002c0)='eql\x00') openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) keyctl$set_reqkey_keyring(0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="52805da0990fef69dc0f01eece73fe02ff02ff380f38211af3f081a4768cca0000a08081b5e5bc2b0000002167f00fbab204000000ca63ae79dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") [ 956.797152] binder: send failed reply for transaction 16, target dead 03:35:17 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x100000058fe4}]}) syz_execute_func(&(0x7f0000000380)="af8055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f382143fd64a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e6989f") dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000340)) fstat(0xffffffffffffffff, &(0x7f0000000540)) getgroups(0x0, &(0x7f00000015c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001600)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001640), &(0x7f0000001680)=0xc) getgroups(0x0, &(0x7f00000016c0)) getpgrp(0x0) stat(&(0x7f0000001a00)='./file0\x00', &(0x7f0000001a40)) getresgid(&(0x7f0000001ac0), &(0x7f0000001b00), &(0x7f0000001b40)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001b80), &(0x7f0000001bc0)=0xc) fstat(0xffffffffffffffff, &(0x7f0000001c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001c80), &(0x7f0000001cc0)=0xc) geteuid() getpgrp(0xffffffffffffffff) lstat(&(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)) getresgid(&(0x7f0000001e40), &(0x7f0000001e80), &(0x7f0000001ec0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001f00)) getuid() getresgid(&(0x7f0000001f40), &(0x7f0000001f80), &(0x7f0000001fc0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003680)) getuid() getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003900)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003940)={{{@in6=@dev, @in=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000003a40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003a80), &(0x7f0000003ac0)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000003b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003b40), &(0x7f0000003b80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003bc0), &(0x7f0000003c00)=0xc) getpgrp(0x0) 03:35:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={"62726964676530000000000000012200", 0xfffffffffffffffb}) ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37) [ 957.605852] bridge0: port 2(bridge_slave_1) entered disabled state [ 957.614763] bridge0: port 1(bridge_slave_0) entered disabled state 03:35:17 executing program 2: futex(&(0x7f0000000080), 0x6, 0x0, &(0x7f0000000380)={0x77359400}, &(0x7f0000000300), 0x0) clock_getres(0x0, &(0x7f00000002c0)) creat(&(0x7f00000000c0)='./file0\x00', 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz0\x00', 0x1ff) futex(&(0x7f0000000a00), 0x0, 0xfffffffffffffffe, &(0x7f0000000540)={0x77359400}, &(0x7f00000007c0), 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000003880)='cpuacct.usage_percpu\x00', 0x0, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000240)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000280)={0x0, @empty, 0x0, 0x0, 'ovf\x00'}, 0x2c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe2}]}) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000340)=0xc) geteuid() geteuid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000005c0)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000000900)) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000a40)) getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000032c0)={{{@in=@remote, @in=@multicast1}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f00000009c0)=0xe8) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000000b00)=0xc) geteuid() getgroups(0x0, &(0x7f00000033c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000003400)) geteuid() stat(&(0x7f0000003440)='./file0\x00', &(0x7f0000003900)) fcntl$getown(0xffffffffffffffff, 0x9) geteuid() fstat(0xffffffffffffffff, &(0x7f0000003500)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000038c0)) stat(&(0x7f00000035c0)='./file0\x00', &(0x7f0000003600)) fstat(0xffffffffffffffff, &(0x7f0000003680)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@proc, 0xc, &(0x7f0000000880), 0x0, &(0x7f0000003700)}, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40), &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'bond_slave_0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in6=@ipv4={[], [], @multicast1}, @in=@multicast1}}, {{}, 0x0, @in6=@ipv4}}, &(0x7f0000000500)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in6=@remote, @in6=@dev}}, {{@in=@remote}, 0x0, @in=@local}}, 0xe8) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000300)}) 03:35:18 executing program 1: futex(&(0x7f0000000040), 0x8, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) rename(&(0x7f0000000500)='./file0\x00', &(0x7f00000004c0)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000380)='yeah\x00', 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) syz_emit_ethernet(0x11, &(0x7f00000005c0)={@dev, @empty, [], {@llc={0x4, {@llc={0x0, 0x0, 'd'}}}}}, &(0x7f0000000040)) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0690fef69dc0f01ee8141ff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") accept4$inet6(0xffffffffffffffff, &(0x7f0000000240), &(0x7f0000000280)=0x1c, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000400)) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000800)={0x0, @empty, @dev}, &(0x7f0000000840)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @multicast1, @local}, &(0x7f00000008c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a40)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000b40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000bc0)={{{@in=@local, @in=@dev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0)={@multicast1, @remote}, &(0x7f0000000e00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003500)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000003600)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000005500), &(0x7f0000005540)=0x14) 03:35:18 executing program 0: clock_gettime(0x7ffffffffffffd, &(0x7f0000000200)) clock_gettime(0x0, &(0x7f00000001c0)) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept4$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x0, @rand_addr}, &(0x7f0000000600)=0x10, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f0000000240)=0xe8) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) nanosleep(&(0x7f0000000380)={0x0, 0x989680}, &(0x7f00000003c0)) ioctl$UI_GET_VERSION(0xffffffffffffffff, 0x8004552d, &(0x7f0000000180)) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ptmx\x00', 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000400)={0x0, 0x0, 0x0, {}, {}, @ramp}) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000440)={'bcsh0\x00', {0x2, 0x0, @loopback}}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) prctl$getname(0x10, &(0x7f0000000640)=""/32) sched_setaffinity(0x0, 0x8, &(0x7f0000000300)) connect(0xffffffffffffffff, &(0x7f0000000480)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'fpu(cbc-twofish-3way)\x00'}, 0x80) syz_execute_func(&(0x7f00000002c0)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:35:18 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000000180)=[{0x1d, 0x0, 0x4000000000401}, {}, {0x6}]}, 0x10) 03:35:18 executing program 3: keyctl$set_reqkey_keyring(0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000280), &(0x7f00000002c0)=0x4) ioctl$KVM_UNREGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae68, &(0x7f0000000300)) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000004c0)={0x0, 0x7530}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) arch_prctl(0x0, &(0x7f0000000480)) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000440)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:35:18 executing program 2: ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) removexattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="2e820e85843ec6cd4e48b6be0bfe3d1bc897f5989e435a196f"]) bind$inet6(0xffffffffffffffff, &(0x7f0000000180), 0x1c) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) stat(&(0x7f0000000680)='./file0\x00', &(0x7f0000000740)) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000001600)=""/4096) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) sendmsg(r0, &(0x7f0000000700)={&(0x7f0000000100)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000640), 0x0, &(0x7f0000002600)}, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x6) 03:35:18 executing program 3: semget(0x2, 0x0, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000600)=""/116) keyctl$set_reqkey_keyring(0x10, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x10, &(0x7f00000004c0)={&(0x7f00000003c0)=""/240, 0xf0}}, 0x10) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x10, &(0x7f0000000080)={&(0x7f0000000200)=""/131, 0xfffffffffffffd70}}, 0x11a) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) getpgid(0xffffffffffffffff) getpgid(0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0x4) msgget$private(0x0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000580)=ANY=[]) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@mcast2}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in=@broadcast}}, &(0x7f00000005c0)=0xe8) getresgid(&(0x7f0000000340), &(0x7f0000000400), &(0x7f0000000440)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0), 0x4) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f0000000300)) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) [ 958.973723] bridge0: port 2(bridge_slave_1) entered blocking state [ 958.980186] bridge0: port 2(bridge_slave_1) entered forwarding state [ 958.986970] bridge0: port 1(bridge_slave_0) entered blocking state [ 958.993392] bridge0: port 1(bridge_slave_0) entered forwarding state [ 959.075709] device bridge0 entered promiscuous mode [ 959.110264] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 959.143092] bridge0: port 2(bridge_slave_1) entered disabled state [ 959.149639] bridge0: port 1(bridge_slave_0) entered disabled state [ 959.201030] device bridge0 left promiscuous mode 03:35:19 executing program 2: ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) removexattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="2e820e85843ec6cd4e48b6be0bfe3d1bc897f5989e435a196f"]) bind$inet6(0xffffffffffffffff, &(0x7f0000000180), 0x1c) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) stat(&(0x7f0000000680)='./file0\x00', &(0x7f0000000740)) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000001600)=""/4096) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) sendmsg(r0, &(0x7f0000000700)={&(0x7f0000000100)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000640), 0x0, &(0x7f0000002600)}, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x6) 03:35:19 executing program 1: ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) removexattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="2e820e85843ec6cd4e48b6be0bfe3d1bc897f5989e435a196f"]) bind$inet6(0xffffffffffffffff, &(0x7f0000000180), 0x1c) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) stat(&(0x7f0000000680)='./file0\x00', &(0x7f0000000740)) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000001600)=""/4096) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) sendmsg(r0, &(0x7f0000000700)={&(0x7f0000000100)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000640), 0x0, &(0x7f0000002600)}, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x6) 03:35:19 executing program 0: ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) removexattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="2e820e85843ec6cd4e48b6be0bfe3d1bc897f5989e435a196f"]) bind$inet6(0xffffffffffffffff, &(0x7f0000000180), 0x1c) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) stat(&(0x7f0000000680)='./file0\x00', &(0x7f0000000740)) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000001600)=""/4096) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) sendmsg(r0, &(0x7f0000000700)={&(0x7f0000000100)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000640), 0x0, &(0x7f0000002600)}, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x6) 03:35:19 executing program 3: semget(0x2, 0x0, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000600)=""/116) keyctl$set_reqkey_keyring(0x10, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x10, &(0x7f00000004c0)={&(0x7f00000003c0)=""/240, 0xf0}}, 0x10) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x10, &(0x7f0000000080)={&(0x7f0000000200)=""/131, 0xfffffffffffffd70}}, 0x11a) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) getpgid(0xffffffffffffffff) getpgid(0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0x4) msgget$private(0x0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000580)=ANY=[]) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@mcast2}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in=@broadcast}}, &(0x7f00000005c0)=0xe8) getresgid(&(0x7f0000000340), &(0x7f0000000400), &(0x7f0000000440)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0), 0x4) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f0000000300)) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) [ 960.219284] bridge0: port 2(bridge_slave_1) entered blocking state [ 960.225897] bridge0: port 2(bridge_slave_1) entered forwarding state [ 960.232582] bridge0: port 1(bridge_slave_0) entered blocking state [ 960.239023] bridge0: port 1(bridge_slave_0) entered forwarding state 03:35:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={"62726964676530000000000000012200", 0xfffffffffffffffb}) ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37) [ 960.395573] device bridge0 entered promiscuous mode [ 960.401530] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 960.409249] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 03:35:20 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f00000009c0)) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mknod$loop(&(0x7f00000002c0)='./file0\x00', 0x0, 0xffffffffffffffff) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000640)=0xfffffffffffffec9) gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@remote, @in=@dev}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f0000000b00)=0xe8) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000000b80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c00), &(0x7f0000000c40)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000d80)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@ipv4={[], [], @dev}, @in=@local}}, {{@in=@rand_addr}, 0x0, @in6=@local}}, &(0x7f0000000ec0)=0xe8) lstat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) fcntl$getown(0xffffffffffffffff, 0x9) getgroups(0x0, &(0x7f0000002640)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002680)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000026c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in=@loopback}}}, &(0x7f00000027c0)=0xe8) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002800)) fstat(0xffffffffffffffff, &(0x7f0000002840)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002940)) stat(&(0x7f0000002980)='./file0\x00', &(0x7f00000029c0)) fstat(0xffffffffffffffff, &(0x7f0000002a40)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002bc0)={&(0x7f00000001c0), 0xc, &(0x7f0000000d40), 0x0, &(0x7f0000002ac0)}, 0x0) mknod(&(0x7f00007f2ff8)='./file0\x00', 0x0, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000300)) sendmmsg(0xffffffffffffffff, &(0x7f0000000800), 0x0, 0x0) open(&(0x7f00007ddff8)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01ee0dce41ff0fc4a33d062900370f38211ac4410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b770989f7f") [ 960.658888] bridge0: port 2(bridge_slave_1) entered disabled state [ 960.667558] bridge0: port 1(bridge_slave_0) entered disabled state [ 960.774121] device bridge0 left promiscuous mode 03:35:20 executing program 2: ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) removexattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="2e820e85843ec6cd4e48b6be0bfe3d1bc897f5989e435a196f"]) bind$inet6(0xffffffffffffffff, &(0x7f0000000180), 0x1c) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) stat(&(0x7f0000000680)='./file0\x00', &(0x7f0000000740)) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000001600)=""/4096) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) sendmsg(r0, &(0x7f0000000700)={&(0x7f0000000100)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000640), 0x0, &(0x7f0000002600)}, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x6) 03:35:20 executing program 1: ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) removexattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="2e820e85843ec6cd4e48b6be0bfe3d1bc897f5989e435a196f"]) bind$inet6(0xffffffffffffffff, &(0x7f0000000180), 0x1c) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) stat(&(0x7f0000000680)='./file0\x00', &(0x7f0000000740)) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000001600)=""/4096) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) sendmsg(r0, &(0x7f0000000700)={&(0x7f0000000100)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000640), 0x0, &(0x7f0000002600)}, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x6) 03:35:21 executing program 0: ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) removexattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="2e820e85843ec6cd4e48b6be0bfe3d1bc897f5989e435a196f"]) bind$inet6(0xffffffffffffffff, &(0x7f0000000180), 0x1c) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) stat(&(0x7f0000000680)='./file0\x00', &(0x7f0000000740)) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000001600)=""/4096) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) sendmsg(r0, &(0x7f0000000700)={&(0x7f0000000100)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000640), 0x0, &(0x7f0000002600)}, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x6) 03:35:21 executing program 3: semget(0x2, 0x0, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000600)=""/116) keyctl$set_reqkey_keyring(0x10, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x10, &(0x7f00000004c0)={&(0x7f00000003c0)=""/240, 0xf0}}, 0x10) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x10, &(0x7f0000000080)={&(0x7f0000000200)=""/131, 0xfffffffffffffd70}}, 0x11a) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) getpgid(0xffffffffffffffff) getpgid(0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0x4) msgget$private(0x0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000580)=ANY=[]) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@mcast2}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in=@broadcast}}, &(0x7f00000005c0)=0xe8) getresgid(&(0x7f0000000340), &(0x7f0000000400), &(0x7f0000000440)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0), 0x4) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f0000000300)) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) 03:35:21 executing program 1: ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) removexattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="2e820e85843ec6cd4e48b6be0bfe3d1bc897f5989e435a196f"]) bind$inet6(0xffffffffffffffff, &(0x7f0000000180), 0x1c) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) stat(&(0x7f0000000680)='./file0\x00', &(0x7f0000000740)) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000001600)=""/4096) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) sendmsg(r0, &(0x7f0000000700)={&(0x7f0000000100)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000640), 0x0, &(0x7f0000002600)}, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x6) 03:35:22 executing program 3: semget(0x2, 0x0, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000600)=""/116) keyctl$set_reqkey_keyring(0x10, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x10, &(0x7f00000004c0)={&(0x7f00000003c0)=""/240, 0xf0}}, 0x10) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x10, &(0x7f0000000080)={&(0x7f0000000200)=""/131, 0xfffffffffffffd70}}, 0x11a) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) getpgid(0xffffffffffffffff) getpgid(0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0x4) msgget$private(0x0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000580)=ANY=[]) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@mcast2}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in=@broadcast}}, &(0x7f00000005c0)=0xe8) getresgid(&(0x7f0000000340), &(0x7f0000000400), &(0x7f0000000440)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0), 0x4) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f0000000300)) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) 03:35:22 executing program 2: ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) removexattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="2e820e85843ec6cd4e48b6be0bfe3d1bc897f5989e435a196f"]) bind$inet6(0xffffffffffffffff, &(0x7f0000000180), 0x1c) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) stat(&(0x7f0000000680)='./file0\x00', &(0x7f0000000740)) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000001600)=""/4096) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) sendmsg(r0, &(0x7f0000000700)={&(0x7f0000000100)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000640), 0x0, &(0x7f0000002600)}, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x6) 03:35:22 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045519, &(0x7f00000001c0)) 03:35:22 executing program 0: ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) removexattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="2e820e85843ec6cd4e48b6be0bfe3d1bc897f5989e435a196f"]) bind$inet6(0xffffffffffffffff, &(0x7f0000000180), 0x1c) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) stat(&(0x7f0000000680)='./file0\x00', &(0x7f0000000740)) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000001600)=""/4096) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) sendmsg(r0, &(0x7f0000000700)={&(0x7f0000000100)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000640), 0x0, &(0x7f0000002600)}, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x6) 03:35:22 executing program 5: msgget(0xffffffffffffffff, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in6=@loopback}}, {{@in6}}}, &(0x7f0000000500)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000540)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000580)) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000005c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000000140)=ANY=[], 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") [ 962.911643] bridge0: port 2(bridge_slave_1) entered blocking state [ 962.918126] bridge0: port 2(bridge_slave_1) entered forwarding state [ 962.924897] bridge0: port 1(bridge_slave_0) entered blocking state [ 962.931280] bridge0: port 1(bridge_slave_0) entered forwarding state [ 963.138325] device bridge0 entered promiscuous mode 03:35:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={"62726964676530000000000000012200", 0xfffffffffffffffb}) ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37) 03:35:23 executing program 3: add_key(&(0x7f0000000580)='pkcs7_test\x00', &(0x7f00000005c0), &(0x7f0000000640), 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000a80)='trusted\x00', &(0x7f0000000780), &(0x7f00000009c0), 0x0, 0xfffffffffffffff9) request_key(&(0x7f0000000380)='cifs.spnego\x00', &(0x7f00000003c0), &(0x7f0000000600)="5e6d643573756db100", 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000004c0), 0x4) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000004180)=ANY=[], 0x0, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000180), 0x4) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000740)) getpgid(0xffffffffffffffff) getpid() clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) keyctl$invalidate(0x15, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=""/116, &(0x7f0000000280)=0x74) getpid() syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x100000058fe4}]}) syz_execute_func(&(0x7f0000000380)="af8055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f43fd64a741dfe0400f01efe5e57d0fecec1a01460f01ee31a3b786e6989f") 03:35:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={"62726964676530000000000000012200", 0xfffffffffffffffb}) ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37) 03:35:23 executing program 0: recvmmsg(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0, &(0x7f0000000680)={0x0, 0x1c9c380}) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() clock_gettime(0x0, &(0x7f0000000500)) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) clock_settime(0x0, &(0x7f0000000040)={0x77359400}) futex(&(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) getitimer(0x0, &(0x7f0000000300)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000380)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @loopback}, &(0x7f0000000480)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'veth1_to_bond\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000600)=0x14, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000680)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000006c0)={'rose0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in=@multicast1, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000200)=0x133) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000008c0)={@local}, &(0x7f0000000180)=0x14) accept4(0xffffffffffffffff, &(0x7f0000000a00)=@hci, &(0x7f0000000a80)=0x80, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000ac0)={{{@in6, @in=@dev}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000bc0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002f00)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@local}}, {{@in=@rand_addr}}}, &(0x7f0000003000)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000003100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000003140)=0x14) accept$packet(0xffffffffffffffff, &(0x7f00000031c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003200)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003240)={{{@in6=@dev, @in6=@local}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in6=@local}}, &(0x7f0000003340)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 03:33:20 executing program 1: munmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000) seccomp(0x0, 0x0, &(0x7f0000000100)) keyctl$set_reqkey_keyring(0x4, 0x0) syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) syz_execute_func(&(0x7f00000002c0)="42568055a07b7ac5818a818a8adc00d990c841ff0fc4e271084f00d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1c4a11dd1b44cad000000c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000080)={0x0, 0x0, 0x0, {0x77359400}}) getpid() getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000b00)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000a40)='veth0_to_bond\x00'}, 0x30) getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f00000004c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000a80)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000680)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000640), 0xc, &(0x7f00000006c0)={&(0x7f0000000900)={0x14}, 0x14}}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580)) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000100), &(0x7f0000000140)=0x10) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000180), 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) lstat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000880)) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f00000001c0), 0x8) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000840)) syz_genetlink_get_family_id$nbd(&(0x7f0000000380)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000340), 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x14}, 0x14}}, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000f80)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nullb0\x00', 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000200)=""/94, 0x5e, 0x0, &(0x7f0000000280)={0x77359400}) getgid() getpgrp(0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000800)={0x7}, 0x7) [ 963.547971] bridge0: port 2(bridge_slave_1) entered disabled state [ 963.555510] bridge0: port 1(bridge_slave_0) entered disabled state [ 963.607696] device bridge0 left promiscuous mode 03:33:20 executing program 2: sysinfo(&(0x7f00000008c0)=""/4096) munmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000) getresgid(&(0x7f0000000680), &(0x7f00000006c0), &(0x7f00000002c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000600)) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f00000001c0)}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000003c0)) getpgrp(0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000004c0)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000540)={0x2, 0x0, @dev}, &(0x7f0000000580)=0x10, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000005c0)={'bridge0\x00'}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000440)) syz_open_procfs(0x0, &(0x7f0000000500)='cpuset\x00') clock_gettime(0x0, &(0x7f0000000240)) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000700)={0x0, @time}) epoll_create1(0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000080)) ioctl$KVM_GET_DEBUGREGS(0xffffffffffffffff, 0x8080aea1, &(0x7f0000000780)) pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000480)='y\x00', 0x2, 0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000640)={@remote, @rand_addr}, 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") 03:33:20 executing program 5: ioprio_set$uid(0x2, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffff9c, 0x28, &(0x7f0000000140)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0), 0xc) semget$private(0x0, 0x0, 0x0) semop(0x0, &(0x7f0000000300), 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0), 0x0, 0x0, 0xfffffffffffffffc) syz_emit_ethernet(0x0, &(0x7f0000000640)=ANY=[], &(0x7f0000000040)) personality(0x0) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:33:20 executing program 3: add_key(&(0x7f0000000580)='pkcs7_test\x00', &(0x7f00000005c0), &(0x7f0000000640), 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000a80)='trusted\x00', &(0x7f0000000780), &(0x7f00000009c0), 0x0, 0xfffffffffffffff9) request_key(&(0x7f0000000380)='cifs.spnego\x00', &(0x7f00000003c0), &(0x7f0000000600)="5e6d643573756db100", 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000004c0), 0x4) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000004180)=ANY=[], 0x0, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000180), 0x4) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000740)) getpgid(0xffffffffffffffff) getpid() clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) keyctl$invalidate(0x15, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=""/116, &(0x7f0000000280)=0x74) getpid() syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x100000058fe4}]}) syz_execute_func(&(0x7f0000000380)="af8055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f43fd64a741dfe0400f01efe5e57d0fecec1a01460f01ee31a3b786e6989f") 03:33:20 executing program 0: getpgid(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000005c0)=""/4096) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x100000058fe4}]}) pipe(&(0x7f0000000080)) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000380)="af8055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f382143fd64a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e6989f") dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(0xffffffffffffffff, 0x40485404, &(0x7f0000000000)) socketpair$inet(0x2, 0x0, 0x0, 0x0) 03:33:20 executing program 1: r0 = socket(0x40000000002, 0x3, 0x40) setsockopt$inet_int(r0, 0x0, 0x2, &(0x7f0000000100)=0x80, 0x4) sendto$unix(r0, &(0x7f0000000cc0), 0x0, 0x0, &(0x7f0000000d00)=@abs, 0x6e) [ 964.500896] bridge0: port 2(bridge_slave_1) entered blocking state [ 964.507365] bridge0: port 2(bridge_slave_1) entered forwarding state [ 964.514114] bridge0: port 1(bridge_slave_0) entered blocking state [ 964.520493] bridge0: port 1(bridge_slave_0) entered forwarding state 03:33:20 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x17, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feff7b9f479afff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000c00dc97ea8e547ee03d1c5dde2b3fd5320000b70cb5ff06f048c8e0c7d6488b50b27d596d521dac25d3e365f853bde7fcd8fe680a4dd7e8dea11e2c9b5c8e469e2ba6687ea6940b381ba8558ff065b00eaaffffffffffff83764f29c6aaa0"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000100)='./file0\x00'}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000280)={0x0, r0, 0x8, 0x2}, 0x14) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r2, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r1, r2, &(0x7f0000000000), 0xffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) fcntl$addseals(r2, 0x409, 0x8) writev(r2, &(0x7f0000000180)=[{&(0x7f0000000100)="0e", 0x1}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x50, &(0x7f00000002c0)}, 0x10) [ 964.584957] device bridge0 entered promiscuous mode [ 964.632884] raw_sendmsg: syz-executor1 forgot to set AF_INET. Fix it! 03:33:20 executing program 5: setpriority(0x0, 0x0, 0x0) open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_all\x00', 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000200), &(0x7f0000000480)=0x4) sendto$inet6(0xffffffffffffffff, &(0x7f0000000200), 0x0, 0x0, &(0x7f0000000240)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, &(0x7f0000000300)) syz_emit_ethernet(0x0, &(0x7f00000067c0)=ANY=[], 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@loopback, @in6=@dev}}, {{}, 0x0, @in=@multicast2}}, &(0x7f00000004c0)=0xe8) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000280), &(0x7f0000000180), 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000540)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000640)=0xe8) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000300), &(0x7f0000000040), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) semget(0xffffffffffffffff, 0x0, 0x0) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000340)={@remote, @local}, &(0x7f0000000700)=0xc) eventfd(0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000400)=0x14, 0x0) 03:33:20 executing program 4: add_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480), &(0x7f00000004c0)='r', 0x1, 0xfffffffffffffffb) syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000540)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'team0\x00'}, 0x18) syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000380)) syz_open_procfs(0x0, &(0x7f0000000280)='attr\x00') symlinkat(&(0x7f0000000480)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00') futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) syz_open_dev$rtc(&(0x7f00000000c0)='/dev/rtc#\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000001480)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', &(0x7f0000000d00)}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000000d80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000dc0)={{{@in, @in6=@mcast1}}, {{@in6=@ipv4}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:33:20 executing program 1: keyctl$set_reqkey_keyring(0xa, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000280), 0x0) pipe(&(0x7f0000000780)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000004c0)) write$P9_RGETLOCK(0xffffffffffffffff, &(0x7f0000000580)={0x25, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x7, 'ns/mnt\x00'}}, 0x25) ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000240)) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000500)=""/113, &(0x7f0000000300)=0x71) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x0, &(0x7f0000000480), 0x4) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000080), 0x8) syncfs(0xffffffffffffffff) socket$vsock_stream(0x28, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000180)) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0), &(0x7f00000002c0)=0xc) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000005c0)) syz_open_procfs$namespace(0x0, &(0x7f0000000440)='ns/mnt\x00') seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:33:20 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x17, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feff7b9f479afff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000c00dc97ea8e547ee03d1c5dde2b3fd5320000b70cb5ff06f048c8e0c7d6488b50b27d596d521dac25d3e365f853bde7fcd8fe680a4dd7e8dea11e2c9b5c8e469e2ba6687ea6940b381ba8558ff065b00eaaffffffffffff83764f29c6aaa0"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000100)='./file0\x00'}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000280)={0x0, r0, 0x8, 0x2}, 0x14) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r2, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r1, r2, &(0x7f0000000000), 0xffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) fcntl$addseals(r2, 0x409, 0x8) writev(r2, &(0x7f0000000180)=[{&(0x7f0000000100)="0e", 0x1}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x50, &(0x7f00000002c0)}, 0x10) 03:33:20 executing program 3: add_key(&(0x7f0000000580)='pkcs7_test\x00', &(0x7f00000005c0), &(0x7f0000000640), 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000a80)='trusted\x00', &(0x7f0000000780), &(0x7f00000009c0), 0x0, 0xfffffffffffffff9) request_key(&(0x7f0000000380)='cifs.spnego\x00', &(0x7f00000003c0), &(0x7f0000000600)="5e6d643573756db100", 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000004c0), 0x4) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000004180)=ANY=[], 0x0, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000180), 0x4) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000740)) getpgid(0xffffffffffffffff) getpid() clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) keyctl$invalidate(0x15, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=""/116, &(0x7f0000000280)=0x74) getpid() syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x100000058fe4}]}) syz_execute_func(&(0x7f0000000380)="af8055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f43fd64a741dfe0400f01efe5e57d0fecec1a01460f01ee31a3b786e6989f") 03:33:20 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x17, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feff7b9f479afff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000c00dc97ea8e547ee03d1c5dde2b3fd5320000b70cb5ff06f048c8e0c7d6488b50b27d596d521dac25d3e365f853bde7fcd8fe680a4dd7e8dea11e2c9b5c8e469e2ba6687ea6940b381ba8558ff065b00eaaffffffffffff83764f29c6aaa0"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000100)='./file0\x00'}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000280)={0x0, r0, 0x8, 0x2}, 0x14) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r2, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r1, r2, &(0x7f0000000000), 0xffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) fcntl$addseals(r2, 0x409, 0x8) writev(r2, &(0x7f0000000180)=[{&(0x7f0000000100)="0e", 0x1}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x50, &(0x7f00000002c0)}, 0x10) 03:33:21 executing program 0: futex(&(0x7f0000000040), 0x3, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setxattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)=@random={'trusted.', '\\[,em0}[keyringwlan1em0\x00'}, &(0x7f00000003c0)="5129953a74656d306b657972696e672e262e637075736574656d307b287365637572697479280873656375726974792f6d643573756d2e736563757269747900", 0x40, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x0, 0x0) gettid() pkey_alloc(0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000180)={0x0, 'rose0\x00'}, 0x18) fstat(0xffffffffffffffff, &(0x7f0000000880)) getgroups(0x0, &(0x7f0000000940)) stat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)) stat(&(0x7f0000000a40)='./file0/file0\x00', &(0x7f0000000a80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000b00)={{{@in, @in=@dev}}, {{@in=@loopback}}}, &(0x7f0000000c00)=0xe8) getegid() lstat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getuid() getgid() getuid() lstat(&(0x7f0000006800)='./file1\x00', &(0x7f0000006840)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000068c0), &(0x7f0000006900)=0xc) stat(&(0x7f0000006940)='./file0\x00', &(0x7f0000006980)) stat(&(0x7f0000006b80)='./file0\x00', &(0x7f0000006bc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006c40), &(0x7f0000006c80)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007180)={{{@in=@remote, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f0000007280)=0xe8) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000072c0), &(0x7f0000007300)=0xc) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000007340), &(0x7f0000007380)=0xc) getegid() getresuid(&(0x7f00000073c0), &(0x7f0000007400), &(0x7f0000007440)) getresgid(&(0x7f0000007480), &(0x7f00000074c0), &(0x7f0000007500)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000007540)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000007580)={{{@in6=@mcast1, @in6=@loopback}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f0000007680)=0xe8) getegid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000076c0)={{{@in6=@mcast1, @in6=@dev}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f00000077c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000007800), &(0x7f0000007840)=0xc) getresuid(&(0x7f0000007c40), &(0x7f0000007c80), &(0x7f0000007cc0)) getgroups(0x0, &(0x7f0000007d00)) stat(&(0x7f0000007d40)='./file0\x00', &(0x7f0000007d80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000007e00), &(0x7f0000007e40)=0xc) lstat(&(0x7f00000081c0)='./file0\x00', &(0x7f0000008200)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008280)={{{@in6, @in=@remote}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000008380)=0xe8) getgid() getuid() fstat(0xffffffffffffffff, &(0x7f000000a0c0)) getgroups(0x0, &(0x7f0000008500)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000008540)={{{@in6=@remote, @in6=@dev}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000008640)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000008680), &(0x7f00000086c0)=0xc) lstat(&(0x7f0000008700)='./file0\x00', &(0x7f0000008740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000087c0), &(0x7f0000008800)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000008840)={{{@in, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f0000008940)=0xe8) lstat(&(0x7f0000008980)='./file0\x00', &(0x7f00000089c0)) lstat(&(0x7f0000009180)='./file0\x00', &(0x7f00000091c0)) getresgid(&(0x7f0000009240), &(0x7f0000009280), &(0x7f00000092c0)) stat(&(0x7f0000009300)='./file0\x00', &(0x7f0000009340)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000093c0), &(0x7f0000009400)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009780)={{{@in=@dev, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@loopback}}, &(0x7f0000009880)=0xe8) lstat(&(0x7f00000098c0)='./file0\x00', &(0x7f0000009900)) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:33:21 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x17, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feff7b9f479afff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000c00dc97ea8e547ee03d1c5dde2b3fd5320000b70cb5ff06f048c8e0c7d6488b50b27d596d521dac25d3e365f853bde7fcd8fe680a4dd7e8dea11e2c9b5c8e469e2ba6687ea6940b381ba8558ff065b00eaaffffffffffff83764f29c6aaa0"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000100)='./file0\x00'}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000280)={0x0, r0, 0x8, 0x2}, 0x14) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r2, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r1, r2, &(0x7f0000000000), 0xffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) fcntl$addseals(r2, 0x409, 0x8) writev(r2, &(0x7f0000000180)=[{&(0x7f0000000100)="0e", 0x1}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x50, &(0x7f00000002c0)}, 0x10) 03:33:21 executing program 4: clock_gettime(0x2, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000000c0)) io_setup(0x0, &(0x7f0000000140)) io_submit(0x0, 0x0, &(0x7f0000000580)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000040), 0x4) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000180)) syz_execute_func(&(0x7f0000000400)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") prctl$setendian(0x14, 0x0) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f00000005c0)) mlockall(0x0) 03:33:21 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000400)) syz_open_procfs(0x0, &(0x7f0000000440)='net/wireless\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000640)={0x0, 0xffffffffffffff9c, 0x0, 0xd, &(0x7f0000000600)='team_slave_0\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000680)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f00000005c0)="212c656d3173656c664047504c73797374656dfe00"}, 0xffffffffffffff7d) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000640)=ANY=[], 0x0) writev(0xffffffffffffffff, &(0x7f0000001700), 0x0) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000240)={0x18}, 0x18) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) syz_open_procfs(0x0, &(0x7f00000001c0)='syscall\x00') write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000200)={0x18}, 0x18) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001a00)={{{@in=@dev, @in6=@dev}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) getresgid(&(0x7f0000001b00), &(0x7f0000001b40), &(0x7f0000001b80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) getgroups(0x0, &(0x7f0000001c40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006940)={{{@in6=@local, @in6=@mcast1}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000006200)=0x322) fstat(0xffffffffffffffff, &(0x7f0000001dc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001e40), &(0x7f0000001e80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001ec0), &(0x7f0000001f00)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002480)={{{@in6=@loopback, @in6=@dev}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000002580)=0xe8) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003740)={{{@in6=@loopback, @in=@local}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f00000025c0)=0xe8) getgroups(0x0, &(0x7f0000003840)) fstat(0xffffffffffffffff, &(0x7f0000003880)) getresgid(&(0x7f0000003900), &(0x7f0000003940), &(0x7f0000003980)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004f40)={{{@in6=@mcast1, @in6=@dev}}, {{@in6=@mcast1}}}, &(0x7f0000005040)=0xe8) stat(&(0x7f0000005080)='./file0\x00', &(0x7f00000050c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005480)={{{@in6=@ipv4={[], [], @loopback}, @in6=@ipv4={[], [], @dev}}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000005580)=0xe8) getgid() accept$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000055c0)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000056c0)=0xe8) stat(&(0x7f0000005700)='./file0\x00', &(0x7f0000005740)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000005c80)={{{@in=@remote, @in6=@mcast1}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000005d80)=0xe8) lstat(&(0x7f0000005dc0)='./file0\x00', &(0x7f0000005e00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005e80), &(0x7f0000005ec0)=0xc) stat(&(0x7f0000005f00)='./file1\x00', &(0x7f0000006180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005fc0), &(0x7f0000006000)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006040), &(0x7f00000067c0)=0xffffffffffffff87) getresuid(&(0x7f00000060c0), &(0x7f0000006100), &(0x7f0000006140)) lstat(&(0x7f0000006080)='./file0\x00', &(0x7f0000006800)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000006580), 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000300)) lstat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000780)) waitid(0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000500)) getgroups(0x0, &(0x7f00000025c0)) geteuid() getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002600)={{{@in6=@mcast1, @in6=@local}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000002700)=0xe8) inotify_init1(0x0) syz_execute_func(&(0x7f0000005f80)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e5417545f2420f5cdbc4011d64ac1e5d31a3b767e2989f7f") 03:33:21 executing program 2: getrandom(&(0x7f0000000200)=""/148, 0x94, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000ec0)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000000c0), 0x4) clock_gettime(0x0, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000002c0), &(0x7f0000000340)}}, &(0x7f0000000400)) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f00000007c0)) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)={0x0, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @dev}}}, 0x108) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000800)={{{@in=@rand_addr, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000900)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000940)={{{@in=@dev, @in=@local}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000a80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001340)={{{@in=@local, @in6}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000ac0)=0xfffffffffffffccd) getpeername$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000c00)=0x14) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0) nanosleep(&(0x7f0000000740), &(0x7f0000000780)) syz_execute_func(&(0x7f0000000580)="428055a0766969ef69dc00d99066418955a4e088d557207c2a06c46129ef950000002140a564a70d157a9e400f01efe5e5417545c4e37d6d5200002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f7e") recvmsg(0xffffffffffffffff, &(0x7f0000001200)={&(0x7f0000000d80)=@in={0x2, 0x0, @remote}, 0x80, &(0x7f00000010c0), 0x0, &(0x7f0000001100)=""/205, 0xcd}, 0x0) syz_execute_func(&(0x7f00000001c0)="670fe5e22ef0fe079069203737c339430fa9366522180202a5642541dfe0400f01efe5e54175457d0f2e1a5c01460f01ee26f7792b9f3f") 03:33:21 executing program 1: keyctl$set_reqkey_keyring(0x7, 0xfffffffb) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@mcast1}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000080)=0xe8) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000000c0)=0xe8) getgid() getuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@loopback, @in=@multicast2}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000500)=0xe8) stat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000600)={{{@in6=@ipv4={[], [], @dev}, @in=@rand_addr}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000700)=0xe8) getgroups(0x0, &(0x7f00000007c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) 03:33:21 executing program 3: add_key(&(0x7f0000000580)='pkcs7_test\x00', &(0x7f00000005c0), &(0x7f0000000640), 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000a80)='trusted\x00', &(0x7f0000000780), &(0x7f00000009c0), 0x0, 0xfffffffffffffff9) request_key(&(0x7f0000000380)='cifs.spnego\x00', &(0x7f00000003c0), &(0x7f0000000600)="5e6d643573756db100", 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000004c0), 0x4) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000004180)=ANY=[], 0x0, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000180), 0x4) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000740)) getpgid(0xffffffffffffffff) getpid() clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) keyctl$invalidate(0x15, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=""/116, &(0x7f0000000280)=0x74) getpid() syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x100000058fe4}]}) syz_execute_func(&(0x7f0000000380)="af8055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f43fd64a741dfe0400f01efe5e57d0fecec1a01460f01ee31a3b786e6989f") 03:33:22 executing program 0: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x2, 0x0) shutdown(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000066c0), 0xa0d, 0x0, 0x0) munmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000) syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SG_SET_COMMAND_Q(0xffffffffffffffff, 0x2271, &(0x7f0000000200)) openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, @thr={&(0x7f0000000580), &(0x7f0000000640)}}, &(0x7f0000000480)) timer_delete(0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)="6d65050000000000000070fc55753204000000004a8596714fb019a3cd0aaaeb8c9b97514d57a697cce987a30830a5f2dea694afe287cf85e5c666a4d5f01c7e731e405e", 0x0, 0x0) ioctl$KVM_GET_SREGS(0xffffffffffffffff, 0x8138ae83, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:22 executing program 2: getgid() seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RATTACH(0xffffffffffffffff, &(0x7f00000014c0)={0x14}, 0x14) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000240)="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", 0x0, 0x0) open(&(0x7f00000000c0)='./file0//ile0\x00', 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) semget$private(0x0, 0x0, 0x0) semget$private(0x0, 0x0, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) futex(&(0x7f0000000000), 0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080), 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bind$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000440), 0x7) syz_execute_func(&(0x7f0000000400)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:33:22 executing program 4: setrlimit(0x7, &(0x7f0000000040)={0x0, 0xfffffffffffffffe}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000940), 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)={@remote, @loopback}, &(0x7f00000002c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a80)={{{@in=@dev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000080)=0xfffffffffffffda6) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000005c0)) getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in=@local, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@ipv4={[], [], @rand_addr}}}, &(0x7f0000000140)=0xe8) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000a00)) connect$inet(0xffffffffffffffff, &(0x7f0000000880)={0x2, 0x0, @loopback}, 0x10) io_setup(0x0, &(0x7f0000000180)) prctl$getname(0x10, &(0x7f00000000c0)=""/10) io_cancel(0x0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000001c0)}, &(0x7f0000000240)) syz_execute_func(&(0x7f00000008c0)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:33:22 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L-', 0xff}, 0x28, 0x0) sysinfo(&(0x7f0000000140)=""/245) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000340), 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)) geteuid() getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)) getresuid(&(0x7f0000000680), &(0x7f00000006c0), &(0x7f0000000700)) getgroups(0x0, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") mount(&(0x7f0000000080)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000002c0)) syz_execute_func(&(0x7f0000000280)="428055a0690fef69dc00d9ce41ff0f1837dfcf0f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b7c421fde631e2989f7f") 03:33:22 executing program 1: socketpair$inet6(0xa, 0x0, 0x794, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) nanosleep(&(0x7f0000000040), 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000280)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000140), 0x8, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000bc0)="42805da0a95dde0f3a6086a3088041cb913591913d0629007899442a417934c8c8eefa6466410f51cc302fd0d0451f2e1a3828c40379dfb8d6adbe90dfe29f7f") seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}) 03:33:22 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000280), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r1, &(0x7f0000000100)={&(0x7f0000000240), 0xc, &(0x7f0000000180)={&(0x7f0000009f80)=@delpolicy={0x5c, 0x14, 0x231, 0x0, 0x0, {{@in6=@loopback, @in=@loopback}}, [@policy_type={0xc}]}, 0x5c}, 0x8}, 0x0) 03:33:22 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000140)='/dev/rfkill\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x6}) [ 967.070017] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. [ 967.136280] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. 03:33:22 executing program 3: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) getpid() setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)=0x4, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000064c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000006840)=0xe8) fstat(r1, &(0x7f0000006880)) getresgid(&(0x7f0000007fc0), &(0x7f0000008000), &(0x7f0000008040)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@local, @in=@local}}, {{@in6}}}, &(0x7f00000000c0)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000009880)) getresuid(&(0x7f0000009a40), &(0x7f0000009a80), &(0x7f0000009ac0)) shmget$private(0x0, 0x3000, 0x400, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000300)=""/204) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000009c80), &(0x7f0000009cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) ioctl$KVM_SET_ONE_REG(r0, 0x4010aeac, &(0x7f00000001c0)={0x200, 0x1}) syz_open_dev$evdev(&(0x7f0000001400)='/dev/input/event#\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 03:33:22 executing program 5: add_key(&(0x7f0000001280)='dns_resolver\x00', &(0x7f00000019c0), &(0x7f0000001200)="83ee1d16097057f859736b0512211600f8209a4f11b3e9c462886f013b3fa1920002da3b3426eb456485770dfe35ab409ae3d2ef5ba01de9cf51bd92af9429da562c4120cdf798b5e4ff0f00", 0x4c, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @multicast1, @rand_addr}, &(0x7f00000000c0)=0xc) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0320fef69dc0f01eece73fe19fa380f38211af3f242d2be00000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:33:23 executing program 0: epoll_create(0x9) socket$nl_generic(0x10, 0x3, 0x10) timerfd_create(0x0, 0x0) futex(&(0x7f0000000180), 0x3, 0x0, &(0x7f0000000140)={0x77359400}, &(0x7f0000000080), 0x0) creat(&(0x7f0000000240)='./file0/file0/file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) lstat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000840)) ioctl$KVM_S390_UCAS_UNMAP(0xffffffffffffffff, 0x4018ae51, &(0x7f0000000280)) 03:33:23 executing program 4: getpgid(0xffffffffffffffff) getpgrp(0x0) sched_getparam(0x0, &(0x7f0000000140)) socket$inet(0x2, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000500)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000580)=ANY=[], 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000040), 0x282, 0x0, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) dup(0xffffffffffffffff) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f00000001c0)) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000240)) sched_getscheduler(0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) inotify_init1(0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01ee0dce41ff0fc4a33d062900370f38211ac4410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b770989f7f") [ 967.651883] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 967.651883] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 967.651883] [ 967.691325] EXT4-fs (sda1): re-mounted. Opts: noacl,,errors=continue 03:33:23 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x1}) [ 967.762830] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 967.762830] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 967.762830] [ 967.793566] EXT4-fs (sda1): re-mounted. Opts: noacl,,errors=continue 03:33:23 executing program 3: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) getpid() setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)=0x4, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000064c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000006840)=0xe8) fstat(r1, &(0x7f0000006880)) getresgid(&(0x7f0000007fc0), &(0x7f0000008000), &(0x7f0000008040)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@local, @in=@local}}, {{@in6}}}, &(0x7f00000000c0)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000009880)) getresuid(&(0x7f0000009a40), &(0x7f0000009a80), &(0x7f0000009ac0)) shmget$private(0x0, 0x3000, 0x400, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000300)=""/204) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000009c80), &(0x7f0000009cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) ioctl$KVM_SET_ONE_REG(r0, 0x4010aeac, &(0x7f00000001c0)={0x200, 0x1}) syz_open_dev$evdev(&(0x7f0000001400)='/dev/input/event#\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 03:33:23 executing program 1: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) getpid() setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)=0x4, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000064c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000006840)=0xe8) fstat(r1, &(0x7f0000006880)) getresgid(&(0x7f0000007fc0), &(0x7f0000008000), &(0x7f0000008040)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@local, @in=@local}}, {{@in6}}}, &(0x7f00000000c0)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000009880)) getresuid(&(0x7f0000009a40), &(0x7f0000009a80), &(0x7f0000009ac0)) shmget$private(0x0, 0x3000, 0x400, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000300)=""/204) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000009c80), &(0x7f0000009cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) ioctl$KVM_SET_ONE_REG(r0, 0x4010aeac, &(0x7f00000001c0)={0x200, 0x1}) syz_open_dev$evdev(&(0x7f0000001400)='/dev/input/event#\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 03:33:23 executing program 2: unshare(0x10102) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000140)='lo\x00') eventfd(0x0) socket$inet_udplite(0xa, 0x2, 0x88) dup(0xffffffffffffffff) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) fcntl$getflags(0xffffffffffffffff, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000080)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f00000001c0)) nanosleep(&(0x7f0000000040), 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sysinfo(&(0x7f0000000840)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") recvmsg(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000240)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000000ac0), 0x0, &(0x7f0000000b80)=""/207, 0xcf}, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f175000c4227d19decb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 03:33:23 executing program 5: fstat(0xffffffffffffff9c, &(0x7f0000000380)) geteuid() ioprio_set$uid(0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)) prctl$setname(0x25, &(0x7f0000000040)='bdevselfcgroupself') bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0), 0x4) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000180)) openat$mixer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000940)=ANY=[], &(0x7f0000000480)) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000004c0), 0xc) dup(0xffffffffffffffff) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, "c3c7f00418be0017d8aa1a1c1d646d2879707a57d32ce49dd0e10c79808086c5"}) syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000006100)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000006200)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000006380), &(0x7f00000063c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000006440)={0x0, @dev, @multicast2}, &(0x7f0000006480)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540), &(0x7f0000000580)=0xc) geteuid() fstat(0xffffffffffffffff, &(0x7f00000005c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xc) lstat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) geteuid() getuid() stat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000500)='system.posix_acl_access\x00', &(0x7f0000000900)=ANY=[], 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006600)={{{@in6=@mcast1, @in=@dev}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000006700)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000006780)={@multicast1, @broadcast}, &(0x7f00000067c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006800)={{{@in=@dev, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000006900)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0ab878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") [ 968.224946] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 968.224946] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 968.224946] [ 968.282008] EXT4-fs (sda1): re-mounted. Opts: noacl,,errors=continue [ 968.307694] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 968.307694] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 968.307694] 03:33:24 executing program 0: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300)='/dev/hwrng\x00', 0x200200, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f00000003c0)) clock_gettime(0x0, &(0x7f0000000200)) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) dup(0xffffffffffffffff) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000280)={'bond0\x00'}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) syz_execute_func(&(0x7f0000000340)="42805da07e0fef69dc640f175000c4c1785b6cc2f9cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e57547fa2e18c4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={0xffffffffffffffff, 0x28, &(0x7f0000000180)}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000840)) creat(&(0x7f0000000080)='./file0\x00', 0x0) geteuid() getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) getpgid(0xffffffffffffffff) write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f00000002c0)={0x28}, 0x28) 03:33:24 executing program 2: clock_gettime(0x7, &(0x7f00000001c0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000002bc0), 0x0, 0x0, &(0x7f0000002e00)={0x77359400}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='system!\x00system\x00'}, 0x10) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000180), 0x10) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000940)=""/17) accept4$unix(0xffffffffffffff9c, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') request_key(&(0x7f00000006c0)='pkcs7_test\x00', &(0x7f0000000900), &(0x7f0000000b00)='*$\x00', 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000004c0), 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'team0\x00'}) getpid() geteuid() getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001780)={{{@in, @in=@multicast1}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f0000000700)=0xe8) lstat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001880)) geteuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000018c0)={{{@in=@multicast2, @in=@loopback}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f00000019c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002d80)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007dc0)={{{@in=@loopback, @in=@rand_addr}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000008440)=0xfffffffffffffeab) getegid() getpgid(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000007ec0)={{{@in=@rand_addr, @in=@local}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000007fc0)=0xe8) getgroups(0x0, &(0x7f0000008000)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000008040)) stat(&(0x7f0000008080)='./file0\x00', &(0x7f00000080c0)) stat(&(0x7f0000008140)='./file0\x00', &(0x7f0000008180)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000008200)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000008240), &(0x7f0000008280)=0xc) getgroups(0x0, &(0x7f00000082c0)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000008400)={&(0x7f0000000200)=@proc, 0xc, &(0x7f0000001a00), 0x0, &(0x7f0000008300)}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000500)={@empty, @remote}, &(0x7f0000000540)=0xc) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "70144461f373c9de3fbcd2d8511517a6132c49ca52f5766e7188046d66a23a1d0cf71efb7e26bfcb42a21c09940ebf684568b0857fcd4563d6e7638c2b1f27e4", "b65a6d478bb1ac13a889648b91c5db11c6a16ce22d17d490029b1a2d64c9ab70b8845545a793e430b78a4287134aa04247f14f762bdef9b0942cb31c39369e2f", "4a7f3afd9effde715ba1939252b2bf66679f9f76c9a6f93ab63f13f668799df8"}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@broadcast, @in6=@mcast1}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000000680)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000b80), &(0x7f0000000740)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000780)={{{@in=@rand_addr, @in6}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f0000000880)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000b40)) getpgid(0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@remote}}, {{}, 0x0, @in6=@dev}}, &(0x7f00000008c0)=0xe8) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") [ 968.343406] EXT4-fs (sda1): re-mounted. Opts: noacl,,errors=continue 03:33:24 executing program 3: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) getpid() setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)=0x4, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000064c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000006840)=0xe8) fstat(r1, &(0x7f0000006880)) getresgid(&(0x7f0000007fc0), &(0x7f0000008000), &(0x7f0000008040)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@local, @in=@local}}, {{@in6}}}, &(0x7f00000000c0)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000009880)) getresuid(&(0x7f0000009a40), &(0x7f0000009a80), &(0x7f0000009ac0)) shmget$private(0x0, 0x3000, 0x400, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000300)=""/204) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000009c80), &(0x7f0000009cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) ioctl$KVM_SET_ONE_REG(r0, 0x4010aeac, &(0x7f00000001c0)={0x200, 0x1}) syz_open_dev$evdev(&(0x7f0000001400)='/dev/input/event#\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 03:33:24 executing program 1: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) getpid() setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)=0x4, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000064c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000006840)=0xe8) fstat(r1, &(0x7f0000006880)) getresgid(&(0x7f0000007fc0), &(0x7f0000008000), &(0x7f0000008040)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@local, @in=@local}}, {{@in6}}}, &(0x7f00000000c0)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000009880)) getresuid(&(0x7f0000009a40), &(0x7f0000009a80), &(0x7f0000009ac0)) shmget$private(0x0, 0x3000, 0x400, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000300)=""/204) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000009c80), &(0x7f0000009cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) ioctl$KVM_SET_ONE_REG(r0, 0x4010aeac, &(0x7f00000001c0)={0x200, 0x1}) syz_open_dev$evdev(&(0x7f0000001400)='/dev/input/event#\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) [ 968.710313] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 968.710313] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 968.710313] [ 968.733736] EXT4-fs (sda1): re-mounted. Opts: noacl,,errors=continue 03:33:24 executing program 1: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) getpid() setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)=0x4, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000064c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000006840)=0xe8) fstat(r1, &(0x7f0000006880)) getresgid(&(0x7f0000007fc0), &(0x7f0000008000), &(0x7f0000008040)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@local, @in=@local}}, {{@in6}}}, &(0x7f00000000c0)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000009880)) getresuid(&(0x7f0000009a40), &(0x7f0000009a80), &(0x7f0000009ac0)) shmget$private(0x0, 0x3000, 0x400, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000300)=""/204) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000009c80), &(0x7f0000009cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) ioctl$KVM_SET_ONE_REG(r0, 0x4010aeac, &(0x7f00000001c0)={0x200, 0x1}) syz_open_dev$evdev(&(0x7f0000001400)='/dev/input/event#\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 03:33:24 executing program 3: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) getpid() setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)=0x4, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000064c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000006840)=0xe8) fstat(r1, &(0x7f0000006880)) getresgid(&(0x7f0000007fc0), &(0x7f0000008000), &(0x7f0000008040)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@local, @in=@local}}, {{@in6}}}, &(0x7f00000000c0)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000009880)) getresuid(&(0x7f0000009a40), &(0x7f0000009a80), &(0x7f0000009ac0)) shmget$private(0x0, 0x3000, 0x400, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000300)=""/204) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000009c80), &(0x7f0000009cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) ioctl$KVM_SET_ONE_REG(r0, 0x4010aeac, &(0x7f00000001c0)={0x200, 0x1}) syz_open_dev$evdev(&(0x7f0000001400)='/dev/input/event#\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 03:33:24 executing program 4: getpgid(0xffffffffffffffff) getpgrp(0x0) sched_getparam(0x0, &(0x7f0000000140)) socket$inet(0x2, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000500)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000580)=ANY=[], 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000040), 0x282, 0x0, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) dup(0xffffffffffffffff) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f00000001c0)) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000240)) sched_getscheduler(0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) inotify_init1(0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01ee0dce41ff0fc4a33d062900370f38211ac4410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b770989f7f") 03:33:24 executing program 5: clock_gettime(0x4, &(0x7f0000000040)) socket$packet(0x11, 0x0, 0x300) shutdown(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000003580), 0x0, 0x0, &(0x7f0000000080)) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() geteuid() stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)) getresuid(&(0x7f00000001c0), &(0x7f00000005c0), &(0x7f0000000600)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000800)=0xc) getresuid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ec0), &(0x7f0000000f00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000f40)={{{@in6=@mcast1, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000001040)=0xe8) getresgid(&(0x7f0000001080), &(0x7f00000010c0), &(0x7f0000001100)) geteuid() getgroups(0x0, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001180)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000001280)=0xe8) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001740)={{{@in=@remote, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000001840)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f00000018c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001900)={{{@in=@broadcast, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000001a00)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) lstat(&(0x7f0000001ac0)='./file0\x00', &(0x7f0000001b00)) getegid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000001e80)={{{@in6=@dev, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000001f80)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001fc0), &(0x7f0000002000)=0xc) getuid() getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002340), &(0x7f0000002380)=0xc) getgroups(0x0, &(0x7f00000023c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000034c0)={{{@in6, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002400)=0x3e4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000035c0), &(0x7f0000003600)=0xc) getresuid(&(0x7f0000003f00), &(0x7f0000003f40), &(0x7f0000003f80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003fc0), &(0x7f0000004000)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004040)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000004140)=0xe8) getgid() stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004240), &(0x7f0000004280)=0xc) lstat(&(0x7f00000042c0)='./file0\x00', &(0x7f0000004300)) getgroups(0x0, &(0x7f0000004380)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000043c0)={{{@in=@dev, @in6=@mcast1}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f00000044c0)=0xe8) lstat(&(0x7f0000004500)='./file0\x00', &(0x7f0000004540)) getresuid(&(0x7f00000045c0), &(0x7f0000004600), &(0x7f0000004640)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004680), &(0x7f00000046c0)=0xc) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getegid() fstat(0xffffffffffffffff, &(0x7f0000004cc0)) stat(&(0x7f0000004d40)='./file0\x00', &(0x7f0000004d80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004e80), 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(0xffffffffffffffff, 0x3) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000004c0)={0x0, 0x1ed, &(0x7f0000000300)}, &(0x7f0000000500)=0x10) ioctl$KVM_GET_DEBUGREGS(0xffffffffffffffff, 0x8080aea1, &(0x7f0000000340)) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x19, &(0x7f0000000540), 0x8) signalfd(0xffffffffffffffff, &(0x7f0000000300), 0x8) inotify_init() shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:33:25 executing program 1: shmat(0x0, &(0x7f0000000000/0x2000)=nil, 0x4000) r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x3ff, 0x202001) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f00000005c0), &(0x7f0000001600)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000001680)={0x0, 0x38, &(0x7f0000005dc0)=[@in6={0xa, 0x4e22, 0x2, @loopback, 0x7}, @in6={0xa, 0x4e20, 0x0, @loopback, 0x1}]}, &(0x7f00000016c0)=0x10) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000001700)={0x0, 0x7}, &(0x7f0000001740)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000002b40)={0x0, 0xfffffffffffffffc}, &(0x7f0000002b80)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002bc0)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000002c00)=0x14) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000005540)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x21}}}}, &(0x7f0000005600)=0x84) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000005780)={0x0, 0x3}, &(0x7f00000057c0)=0x8) ioctl$KVM_SET_CLOCK(r0, 0x4030ae7b, &(0x7f00000058c0)={0x7, 0x9}) accept$packet(r0, &(0x7f000000ae80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000aec0)=0x14) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x7}, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) pipe2(&(0x7f0000001640), 0x4000) close(0xffffffffffffffff) bind$nfc_llcp(0xffffffffffffffff, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "df5a4ee9efcbc0f6ea2d95a622971554175b370849b488649394688e97a1fa14893c44bb591f5c60b3fe73c2ac6a0f5e28df3ee68efd30df5e01784c0aea39"}, 0x60) write(r1, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r1, r2, 0x0, 0x10009) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000100)=[@in={0x2, 0x4e24}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x19}}], 0x20) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000180)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) 03:33:25 executing program 3: keyctl$set_reqkey_keyring(0x7, 0x3734f173) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.stat\x00', 0x0, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x7e, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000005c0), 0x10) accept4(0xffffffffffffffff, &(0x7f0000000300)=@can, &(0x7f0000000480)=0x80, 0x0) sendto$packet(0xffffffffffffffff, &(0x7f0000000240), 0x0, 0x0, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) io_setup(0x0, &(0x7f0000000280)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000004f80)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f00000001c0), 0x4) getsockname(0xffffffffffffffff, &(0x7f0000000380)=@xdp, &(0x7f0000000400)=0x80) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000140), &(0x7f0000000200)=0x4) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f00000000c0)={'gre0\x00', {0x2, 0x0, @loopback}}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000640)={{{@in6}}, {{@in=@local}, 0x0, @in=@multicast1}}, &(0x7f00000007c0)=0xe8) stat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000a00)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000010c0)={{{@in=@multicast2, @in=@rand_addr}}, {{}, 0x0, @in=@multicast1}}, &(0x7f00000011c0)=0xe8) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004b00)) getuid() stat(&(0x7f0000004b40)='./file0\x00', &(0x7f0000004b80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004c80)={{{@in6=@mcast1, @in=@multicast1}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000004d80)=0xe8) stat(&(0x7f0000004dc0)='./file0\x00', &(0x7f0000004e00)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000004f40)={&(0x7f0000000600)=@proc, 0xc, &(0x7f0000004a80), 0x0, &(0x7f0000004e80)}, 0x0) socket$pppoe(0x18, 0x1, 0x0) io_submit(0x0, 0x0, &(0x7f0000000440)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") fcntl$notify(0xffffffffffffffff, 0x402, 0x0) fdatasync(0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500)}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f0000000580)={0x12, 0x10, 0xfa00, {&(0x7f0000000440)}}, 0x18) 03:33:25 executing program 2: dup(0xffffffffffffffff) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) openat$urandom(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/urandom\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000340)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000003c0)={'gretap0\x00'}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000300)='/dev/rtc0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000015c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001600)={{{@in=@rand_addr, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001700)=0xe8) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000500), &(0x7f0000000580)=0x68) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f00000002c0), 0xc, &(0x7f0000001940)={&(0x7f0000000500)=ANY=[]}}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) socket(0x0, 0x0, 0x0) signalfd(0xffffffffffffff9c, &(0x7f0000000140), 0x8) perf_event_open$cgroup(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000440)=""/98, &(0x7f0000000080)=0x62) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000600)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/uts\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:33:25 executing program 0: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff84, 0x0, @remote, @local, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 03:33:25 executing program 0: getxattr(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)=@known='security.SMACK64\x00', &(0x7f0000000500)=""/84, 0x54) personality(0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000980)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f00000009c0), &(0x7f0000000a00)=0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000a40), &(0x7f0000000a80)=0x8) getitimer(0x0, &(0x7f0000000600)) ustat(0x0, &(0x7f0000000280)) socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000400)=@vsock, 0x80, &(0x7f0000000540), 0x0, &(0x7f00000006c0)}, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000740)='/dev/mixer\x00', 0x0, 0x0) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000000780)) clock_gettime(0x0, &(0x7f0000000240)) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000780)={0x0, @in={{0x2, 0x0, @broadcast}}}, &(0x7f0000000840)=0x90) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000900), &(0x7f0000000940)=0x8) clock_gettime(0x0, &(0x7f00000000c0)) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000640)='/dev/qat_adf_ctl\x00', 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000680)={@remote, @rand_addr}, &(0x7f00000006c0)=0xc) ioctl$HCIINQUIRY(0xffffffffffffffff, 0x800448f0, &(0x7f0000000700)) dup(0xffffffffffffffff) inotify_init() getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@loopback, @local}, &(0x7f00000002c0)=0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000300)='security.SMACK64\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000880)=""/122) clock_gettime(0x0, &(0x7f00000005c0)) syz_execute_func(&(0x7f0000000200)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) rename(&(0x7f0000000080)='./file0\x00', &(0x7f0000000380)='./file0\x00') connect$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000340), 0xa) 03:33:25 executing program 2: add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000400), 0x0, 0x0, 0xfffffffffffffffc) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0), &(0x7f0000000540)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'ip_vti0\x00'}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da012f0400fb34cbfb40f01eece73fe19fa380f38211af3f081768cc8000000c4627923e667f00fbab204000000ca6b2179e54175450f2e1ac4010d64ac1e5d31a3b744dbe271ff0703") ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000400)=""/239) syz_execute_func(&(0x7f00000000c0)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 03:33:25 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000180)="0a5cc80700315f85715070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x2, 0x1c}]}}}]}, 0x3c}}, 0x0) 03:33:25 executing program 4: getpgid(0xffffffffffffffff) getpgrp(0x0) sched_getparam(0x0, &(0x7f0000000140)) socket$inet(0x2, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000500)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000580)=ANY=[], 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000040), 0x282, 0x0, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) dup(0xffffffffffffffff) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f00000001c0)) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000240)) sched_getscheduler(0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) inotify_init1(0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01ee0dce41ff0fc4a33d062900370f38211ac4410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b770989f7f") 03:33:26 executing program 5: keyctl$dh_compute(0x3, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000000280)={&(0x7f0000a3dffa)={'sha1-avx\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) geteuid() getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000140)) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000400)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") socket$inet(0x2, 0x0, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f00000004c0)=""/129) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000240), &(0x7f00000002c0)=0x10) [ 970.369400] (unnamed net_device) (uninitialized): option active_slave: mode dependency failed, not supported in mode balance-rr(0) 03:33:26 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_SNDBIT(r0, 0x4004556a, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x12) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz0\x00'}) write$input_event(r0, &(0x7f00000000c0)={{0x77359400}, 0x12, 0x0, 0x16}, 0x362) 03:33:26 executing program 3: keyctl$set_reqkey_keyring(0x7, 0x3734f173) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.stat\x00', 0x0, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x7e, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000005c0), 0x10) accept4(0xffffffffffffffff, &(0x7f0000000300)=@can, &(0x7f0000000480)=0x80, 0x0) sendto$packet(0xffffffffffffffff, &(0x7f0000000240), 0x0, 0x0, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) io_setup(0x0, &(0x7f0000000280)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000004f80)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f00000001c0), 0x4) getsockname(0xffffffffffffffff, &(0x7f0000000380)=@xdp, &(0x7f0000000400)=0x80) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000140), &(0x7f0000000200)=0x4) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f00000000c0)={'gre0\x00', {0x2, 0x0, @loopback}}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000640)={{{@in6}}, {{@in=@local}, 0x0, @in=@multicast1}}, &(0x7f00000007c0)=0xe8) stat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000a00)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000010c0)={{{@in=@multicast2, @in=@rand_addr}}, {{}, 0x0, @in=@multicast1}}, &(0x7f00000011c0)=0xe8) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004b00)) getuid() stat(&(0x7f0000004b40)='./file0\x00', &(0x7f0000004b80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004c80)={{{@in6=@mcast1, @in=@multicast1}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000004d80)=0xe8) stat(&(0x7f0000004dc0)='./file0\x00', &(0x7f0000004e00)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000004f40)={&(0x7f0000000600)=@proc, 0xc, &(0x7f0000004a80), 0x0, &(0x7f0000004e80)}, 0x0) socket$pppoe(0x18, 0x1, 0x0) io_submit(0x0, 0x0, &(0x7f0000000440)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") fcntl$notify(0xffffffffffffffff, 0x402, 0x0) fdatasync(0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500)}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f0000000580)={0x12, 0x10, 0xfa00, {&(0x7f0000000440)}}, 0x18) [ 970.624817] input: syz1 as /devices/virtual/input/input23 [ 970.680151] input: syz1 as /devices/virtual/input/input24 03:33:26 executing program 0: keyctl$set_reqkey_keyring(0x1d, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) gettid() getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000000b00)=0xc) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) 03:33:26 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_SNDBIT(r0, 0x4004556a, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x12) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz0\x00'}) write$input_event(r0, &(0x7f00000000c0)={{0x77359400}, 0x12, 0x0, 0x16}, 0x362) 03:33:26 executing program 4: getpgid(0xffffffffffffffff) getpgrp(0x0) sched_getparam(0x0, &(0x7f0000000140)) socket$inet(0x2, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000500)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000580)=ANY=[], 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000040), 0x282, 0x0, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) dup(0xffffffffffffffff) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f00000001c0)) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000240)) sched_getscheduler(0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) inotify_init1(0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01ee0dce41ff0fc4a33d062900370f38211ac4410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b770989f7f") 03:33:26 executing program 1: shmat(0x0, &(0x7f0000000000/0x2000)=nil, 0x4000) r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x3ff, 0x202001) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f00000005c0), &(0x7f0000001600)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000001680)={0x0, 0x38, &(0x7f0000005dc0)=[@in6={0xa, 0x4e22, 0x2, @loopback, 0x7}, @in6={0xa, 0x4e20, 0x0, @loopback, 0x1}]}, &(0x7f00000016c0)=0x10) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000001700)={0x0, 0x7}, &(0x7f0000001740)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000002b40)={0x0, 0xfffffffffffffffc}, &(0x7f0000002b80)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002bc0)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000002c00)=0x14) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000005540)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x21}}}}, &(0x7f0000005600)=0x84) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000005780)={0x0, 0x3}, &(0x7f00000057c0)=0x8) ioctl$KVM_SET_CLOCK(r0, 0x4030ae7b, &(0x7f00000058c0)={0x7, 0x9}) accept$packet(r0, &(0x7f000000ae80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000aec0)=0x14) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x7}, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) pipe2(&(0x7f0000001640), 0x4000) close(0xffffffffffffffff) bind$nfc_llcp(0xffffffffffffffff, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "df5a4ee9efcbc0f6ea2d95a622971554175b370849b488649394688e97a1fa14893c44bb591f5c60b3fe73c2ac6a0f5e28df3ee68efd30df5e01784c0aea39"}, 0x60) write(r1, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r1, r2, 0x0, 0x10009) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000100)=[@in={0x2, 0x4e24}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x19}}], 0x20) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000180)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) [ 971.284643] input: syz1 as /devices/virtual/input/input25 03:33:27 executing program 3: keyctl$set_reqkey_keyring(0x7, 0x3734f173) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.stat\x00', 0x0, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x7e, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000005c0), 0x10) accept4(0xffffffffffffffff, &(0x7f0000000300)=@can, &(0x7f0000000480)=0x80, 0x0) sendto$packet(0xffffffffffffffff, &(0x7f0000000240), 0x0, 0x0, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) io_setup(0x0, &(0x7f0000000280)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000004f80)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f00000001c0), 0x4) getsockname(0xffffffffffffffff, &(0x7f0000000380)=@xdp, &(0x7f0000000400)=0x80) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000140), &(0x7f0000000200)=0x4) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f00000000c0)={'gre0\x00', {0x2, 0x0, @loopback}}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000640)={{{@in6}}, {{@in=@local}, 0x0, @in=@multicast1}}, &(0x7f00000007c0)=0xe8) stat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000a00)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000010c0)={{{@in=@multicast2, @in=@rand_addr}}, {{}, 0x0, @in=@multicast1}}, &(0x7f00000011c0)=0xe8) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004b00)) getuid() stat(&(0x7f0000004b40)='./file0\x00', &(0x7f0000004b80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004c80)={{{@in6=@mcast1, @in=@multicast1}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000004d80)=0xe8) stat(&(0x7f0000004dc0)='./file0\x00', &(0x7f0000004e00)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000004f40)={&(0x7f0000000600)=@proc, 0xc, &(0x7f0000004a80), 0x0, &(0x7f0000004e80)}, 0x0) socket$pppoe(0x18, 0x1, 0x0) io_submit(0x0, 0x0, &(0x7f0000000440)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") fcntl$notify(0xffffffffffffffff, 0x402, 0x0) fdatasync(0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500)}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f0000000580)={0x12, 0x10, 0xfa00, {&(0x7f0000000440)}}, 0x18) 03:33:27 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_SNDBIT(r0, 0x4004556a, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x12) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz0\x00'}) write$input_event(r0, &(0x7f00000000c0)={{0x77359400}, 0x12, 0x0, 0x16}, 0x362) 03:33:27 executing program 5: keyctl$dh_compute(0x3, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000000280)={&(0x7f0000a3dffa)={'sha1-avx\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) geteuid() getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000140)) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000400)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") socket$inet(0x2, 0x0, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f00000004c0)=""/129) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000240), &(0x7f00000002c0)=0x10) [ 971.694684] input: syz1 as /devices/virtual/input/input26 03:33:27 executing program 4: keyctl$set_reqkey_keyring(0x5, 0xfffffffd) socket$nl_route(0x10, 0x3, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000240)) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) dup(0xffffffffffffffff) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000180)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000340)={{0x77359400}, {0x77359400}}, &(0x7f0000000380)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000003c0)) add_key(&(0x7f0000000540)='.request_key_auth\x00', &(0x7f0000000580), &(0x7f00000005c0), 0x0, 0xfffffffffffffffb) add_key$user(&(0x7f0000000640)='user\x00', &(0x7f0000000680), &(0x7f00000006c0), 0x0, 0x0) request_key(&(0x7f00000007c0)='rxrpc\x00', &(0x7f0000000800), &(0x7f0000000840)='system!\x00system\x00', 0x0) keyctl$dh_compute(0x17, &(0x7f0000000880), &(0x7f00000008c0)=""/4096, 0x1000, &(0x7f00000019c0)={&(0x7f00000018c0)={'sha1-generic\x00'}, &(0x7f0000001900)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000002dc0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000002bc0), 0x0, 0x0, &(0x7f0000002e00)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='system!\x00system\x00'}, 0x10) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000180), 0x10) accept4$unix(0xffffffffffffff9c, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002e40)={{{@in6=@local, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6}}, &(0x7f0000002f40)=0xe8) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) accept$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000400)=""/69, 0x45}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") fchmodat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x0) ioctl$KVM_GET_PIT2(0xffffffffffffffff, 0x8070ae9f, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000180)}) 03:33:27 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_SNDBIT(r0, 0x4004556a, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x12) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz0\x00'}) write$input_event(r0, &(0x7f00000000c0)={{0x77359400}, 0x12, 0x0, 0x16}, 0x362) 03:33:27 executing program 0: keyctl$set_reqkey_keyring(0x1d, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) gettid() getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000000b00)=0xc) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) [ 972.129770] input: syz1 as /devices/virtual/input/input27 [ 972.231490] audit: type=1326 audit(2000000007.870:68): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=27792 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:33:28 executing program 2: keyctl$setperm(0x14, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000140)) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f00000000c0)=""/25) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:28 executing program 3: keyctl$set_reqkey_keyring(0x7, 0x3734f173) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.stat\x00', 0x0, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x7e, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000005c0), 0x10) accept4(0xffffffffffffffff, &(0x7f0000000300)=@can, &(0x7f0000000480)=0x80, 0x0) sendto$packet(0xffffffffffffffff, &(0x7f0000000240), 0x0, 0x0, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) io_setup(0x0, &(0x7f0000000280)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000004f80)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f00000001c0), 0x4) getsockname(0xffffffffffffffff, &(0x7f0000000380)=@xdp, &(0x7f0000000400)=0x80) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000140), &(0x7f0000000200)=0x4) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f00000000c0)={'gre0\x00', {0x2, 0x0, @loopback}}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000640)={{{@in6}}, {{@in=@local}, 0x0, @in=@multicast1}}, &(0x7f00000007c0)=0xe8) stat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000a00)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000010c0)={{{@in=@multicast2, @in=@rand_addr}}, {{}, 0x0, @in=@multicast1}}, &(0x7f00000011c0)=0xe8) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004b00)) getuid() stat(&(0x7f0000004b40)='./file0\x00', &(0x7f0000004b80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004c80)={{{@in6=@mcast1, @in=@multicast1}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000004d80)=0xe8) stat(&(0x7f0000004dc0)='./file0\x00', &(0x7f0000004e00)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000004f40)={&(0x7f0000000600)=@proc, 0xc, &(0x7f0000004a80), 0x0, &(0x7f0000004e80)}, 0x0) socket$pppoe(0x18, 0x1, 0x0) io_submit(0x0, 0x0, &(0x7f0000000440)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") fcntl$notify(0xffffffffffffffff, 0x402, 0x0) fdatasync(0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500)}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f0000000580)={0x12, 0x10, 0xfa00, {&(0x7f0000000440)}}, 0x18) 03:33:28 executing program 5: keyctl$dh_compute(0x3, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000000280)={&(0x7f0000a3dffa)={'sha1-avx\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) geteuid() getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000140)) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000400)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") socket$inet(0x2, 0x0, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f00000004c0)=""/129) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000240), &(0x7f00000002c0)=0x10) 03:33:28 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000005000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f0000000040)="0f425f69f20f38f10b650feda5000066b9800000c00f326635004000000f30b80d008ec86666de3c0f01cf260f01cb2665660f3a618c0060540fc76b39", 0x3d}], 0x1, 0x0, &(0x7f00000002c0), 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000480)={0x0, 0x0, @pic={0x0, 0x75, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2cdc7cbc}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000140)="65d9f3ba2000b0e1eed9ff66b8c4b800000f23c00f21f86635002005000f23f80f01d1baf80c66b8a322e48266efbafc0cb09dee6726670f32670fb2aec1cb0000ff22c02200", 0x46}], 0x1, 0x0, &(0x7f0000000300), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:33:28 executing program 0: keyctl$set_reqkey_keyring(0x1d, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) gettid() getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000000b00)=0xc) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) 03:33:28 executing program 4: futex(&(0x7f0000000280), 0x4, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, 0x0, 0xfffffffffffffe00) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001500)) getuid() getgid() getresuid(&(0x7f0000000040), &(0x7f00000001c0), &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a06b6969ef69dc00d9901837c4c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:33:28 executing program 1: shmat(0x0, &(0x7f0000000000/0x2000)=nil, 0x4000) r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x3ff, 0x202001) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f00000005c0), &(0x7f0000001600)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000001680)={0x0, 0x38, &(0x7f0000005dc0)=[@in6={0xa, 0x4e22, 0x2, @loopback, 0x7}, @in6={0xa, 0x4e20, 0x0, @loopback, 0x1}]}, &(0x7f00000016c0)=0x10) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000001700)={0x0, 0x7}, &(0x7f0000001740)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000002b40)={0x0, 0xfffffffffffffffc}, &(0x7f0000002b80)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002bc0)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000002c00)=0x14) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000005540)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x21}}}}, &(0x7f0000005600)=0x84) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000005780)={0x0, 0x3}, &(0x7f00000057c0)=0x8) ioctl$KVM_SET_CLOCK(r0, 0x4030ae7b, &(0x7f00000058c0)={0x7, 0x9}) accept$packet(r0, &(0x7f000000ae80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000aec0)=0x14) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x7}, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) pipe2(&(0x7f0000001640), 0x4000) close(0xffffffffffffffff) bind$nfc_llcp(0xffffffffffffffff, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "df5a4ee9efcbc0f6ea2d95a622971554175b370849b488649394688e97a1fa14893c44bb591f5c60b3fe73c2ac6a0f5e28df3ee68efd30df5e01784c0aea39"}, 0x60) write(r1, &(0x7f0000000400)="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", 0x200) sendfile(r1, r2, 0x0, 0x10009) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000100)=[@in={0x2, 0x4e24}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x19}}], 0x20) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000180)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) 03:33:29 executing program 3: futex(&(0x7f0000000440), 0x5, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000000c0)={0x0, @rand_addr, 0x0, 0x0, 'sed\x00'}, 0x2c) memfd_create(&(0x7f0000000180)="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", 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ion\x00', 0x0, 0x0) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000005c0), &(0x7f0000000680)=0x4) syz_genetlink_get_family_id$nbd(&(0x7f0000000480)='nbd\x00') connect$unix(0xffffffffffffffff, &(0x7f0000000380)=@abs, 0x6e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000980)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000009c0)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000a40)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000ac0)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b40)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000b80)={@empty, @multicast1}, &(0x7f0000000bc0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c00)={{{@in=@multicast2, @in6=@local}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000d00)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d40)={{{@in=@loopback, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000000e40)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001700)={{{@in6=@loopback, @in=@multicast2}}, {{@in6=@ipv4}, 0x0, @in=@rand_addr}}, &(0x7f0000001800)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002bc0)={0x0, @multicast2}, &(0x7f0000002c00)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000002c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002c80)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f00000034c0), 0x0, 0x0, &(0x7f0000003500)={0x0, 0x989680}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:33:29 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000240)=""/4096) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x400000000005, &(0x7f0000000100)) fgetxattr(r0, &(0x7f0000000040)=@random={'security.', '\x00'}, &(0x7f0000000140)=""/194, 0xc2) 03:33:29 executing program 5: keyctl$dh_compute(0x3, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000000280)={&(0x7f0000a3dffa)={'sha1-avx\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) geteuid() getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000140)) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000400)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") socket$inet(0x2, 0x0, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f00000004c0)=""/129) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000240), &(0x7f00000002c0)=0x10) 03:33:29 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000240)=""/4096) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x400000000005, &(0x7f0000000100)) fgetxattr(r0, &(0x7f0000000040)=@random={'security.', '\x00'}, &(0x7f0000000140)=""/194, 0xc2) 03:33:29 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000240)=""/4096) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x400000000005, &(0x7f0000000100)) fgetxattr(r0, &(0x7f0000000040)=@random={'security.', '\x00'}, &(0x7f0000000140)=""/194, 0xc2) 03:33:29 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000240)=""/4096) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x400000000005, &(0x7f0000000100)) fgetxattr(r0, &(0x7f0000000040)=@random={'security.', '\x00'}, &(0x7f0000000140)=""/194, 0xc2) 03:33:29 executing program 0: keyctl$set_reqkey_keyring(0x1d, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) gettid() getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000000b00)=0xc) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) 03:33:29 executing program 2: syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) openat$random(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/urandom\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffff9c, 0xc0184900, &(0x7f0000000200)={0x0, 0x0, 0x0, 0xffffffffffffff9c}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000280)='bdev\x00'}, 0x10) dup2(0xffffffffffffffff, 0xffffffffffffffff) pipe(&(0x7f0000000180)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='bdev\x00'}, 0xfffffffffffffda6) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f00000000c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) getuid() getgroups(0x0, &(0x7f0000000280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000002c0)) geteuid() getgroups(0x0, &(0x7f0000000300)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001640), &(0x7f0000001680)=0xc) getgroups(0x0, &(0x7f00000016c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001700)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001740)={{{@in, @in6=@ipv4={[], [], @rand_addr}}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000001840)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000001880)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001900)) fstat(0xffffffffffffffff, &(0x7f0000001940)) getgid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000019c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f0000001b00)=0xfffffffffffffd72) getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001b40)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001b80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001f00)) getuid() getgroups(0x0, &(0x7f0000001f40)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001f80)) stat(&(0x7f0000001fc0)='./file0\x00', &(0x7f0000002000)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002080), &(0x7f00000020c0)=0xc) gettid() getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="42805da0cf0fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 03:33:29 executing program 4: semget(0x3, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0ad6969ef69dc00d99069203737c33bc481d8145200060f38792117172564a70f157a9e660f478431508c0000e5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:33:30 executing program 5: unshare(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0776969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e2987b7f") statfs(&(0x7f0000000500)='./file0/../file0\x00', &(0x7f0000000900)=""/180) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000004c0)) sendmmsg(0xffffffffffffffff, &(0x7f000000d8c0), 0x0, 0x0) getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@local, @in6}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in=@multicast2}}, &(0x7f0000000140)=0xfffffffffffffee7) getgroups(0x0, &(0x7f0000000400)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) lstat(&(0x7f0000000480)='./file1\x00', &(0x7f00000005c0)) getgroups(0x0, &(0x7f0000000040)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@local, @in=@remote}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000780)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000007c0)) 03:33:30 executing program 1: shmat(0x0, &(0x7f0000000000/0x2000)=nil, 0x4000) r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x3ff, 0x202001) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f00000005c0), &(0x7f0000001600)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000001680)={0x0, 0x38, &(0x7f0000005dc0)=[@in6={0xa, 0x4e22, 0x2, @loopback, 0x7}, @in6={0xa, 0x4e20, 0x0, @loopback, 0x1}]}, &(0x7f00000016c0)=0x10) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000001700)={0x0, 0x7}, &(0x7f0000001740)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000002b40)={0x0, 0xfffffffffffffffc}, &(0x7f0000002b80)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002bc0)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000002c00)=0x14) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000005540)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x21}}}}, &(0x7f0000005600)=0x84) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000005780)={0x0, 0x3}, &(0x7f00000057c0)=0x8) ioctl$KVM_SET_CLOCK(r0, 0x4030ae7b, &(0x7f00000058c0)={0x7, 0x9}) accept$packet(r0, &(0x7f000000ae80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000aec0)=0x14) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x7}, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) pipe2(&(0x7f0000001640), 0x4000) close(0xffffffffffffffff) bind$nfc_llcp(0xffffffffffffffff, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "df5a4ee9efcbc0f6ea2d95a622971554175b370849b488649394688e97a1fa14893c44bb591f5c60b3fe73c2ac6a0f5e28df3ee68efd30df5e01784c0aea39"}, 0x60) write(r1, &(0x7f0000000400)="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", 0x200) sendfile(r1, r2, 0x0, 0x10009) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000100)=[@in={0x2, 0x4e24}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x19}}], 0x20) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000180)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) 03:33:30 executing program 3: getpgrp(0x0) ptrace(0xffffffffffffffff, 0x0) ioprio_get$pid(0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000240)={@dev}, &(0x7f0000000280)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000580)={'syzkaller0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@rand_addr, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f00000006c0)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000740)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000780)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f00000007c0)={0x0, @multicast1, @loopback}, &(0x7f0000000800)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000000940)=0xe8) getsockname(0xffffffffffffff9c, &(0x7f0000000980)=@hci, &(0x7f0000000a00)=0x80) accept(0xffffffffffffffff, &(0x7f0000000a40)=@can, &(0x7f0000000ac0)=0x80) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000b40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000b80)={0x0, @multicast1, @multicast2}, &(0x7f0000000bc0)=0xc) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000c40)={@rand_addr, @multicast1}, &(0x7f0000000c80)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000cc0)={{{@in6=@dev, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000dc0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000e00)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000e40)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000e80)={@remote}, &(0x7f0000000ec0)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f0000000f00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000f40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000f80)={'team0\x00'}) accept4$packet(0xffffffffffffff9c, &(0x7f0000000fc0), &(0x7f0000001000)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001040)={{{@in6, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f0000001140)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f00000081c0), 0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000008380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000083c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000008400)={{{@in, @in=@broadcast}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000008500)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000008540)={{{@in, @in6=@local}}, {{@in6}, 0x0, @in6=@mcast1}}, &(0x7f0000008640)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000008680)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000008780)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000087c0)={{{@in=@dev, @in=@dev}}, {{@in=@rand_addr}, 0x0, @in6=@local}}, &(0x7f00000088c0)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000008900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000008940)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f0000008980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000089c0)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000008a40)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000008b40)={@remote}, &(0x7f0000008b80)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000008cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008d00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000008d80), &(0x7f0000008dc0)=0x14) recvmmsg(0xffffffffffffff9c, &(0x7f000000de00), 0x0, 0x0, &(0x7f000000e040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a0626969ef46dc00d9c421a05d2f8a20f2420f58410dc7397c2a0f0fcd78c2c20f38211a40a5c441657538c48391683f000f01efe5e57d0fecec1a1a01460f01ee45dfde35") 03:33:30 executing program 0: syz_mount_image$f2fs(&(0x7f00000001c0)='f2fs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="1020f5f20100070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000002c0)={[{@noinline_data='noinline_data'}, {@nodiscard='nodiscard'}]}) [ 975.049955] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 975.093241] F2FS-fs (loop0): Can't find valid F2FS filesystem in 1th superblock [ 975.140181] attempt to access beyond end of device 03:33:30 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x2000000000001, 0x1, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000733000), 0x2c) bpf$MAP_CREATE(0x0, &(0x7f00000001c0), 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00005f1000)={0xffffffffffffffff, &(0x7f0000eed000), &(0x7f0000b88000)}, 0x20) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000100)) migrate_pages(0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180)) socket(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") [ 975.164775] loop0: rw=12288, want=8200, limit=20 [ 975.189844] attempt to access beyond end of device [ 975.213577] loop0: rw=12288, want=12296, limit=20 [ 975.218672] F2FS-fs (loop0): Failed to get valid F2FS checkpoint 03:33:30 executing program 4: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vcan0\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000), 0x50) sendmmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000871fc8), 0x71, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000640)={{0x2, 0x7f}, 'port0\x00'}) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x1ff, 0x8001}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000004c0)={0x58, 0x0, &(0x7f0000000340)=[@free_buffer, @register_looper, @enter_looper, @transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140)}}], 0x1, 0x0, &(0x7f0000000440)="8f"}) [ 975.266199] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 975.339882] F2FS-fs (loop0): Can't find valid F2FS filesystem in 1th superblock [ 975.382081] attempt to access beyond end of device [ 975.394610] binder: 27915:27916 BC_FREE_BUFFER u0000000000000000 no match [ 975.413265] loop0: rw=12288, want=8200, limit=20 [ 975.424947] binder: 27915:27916 ERROR: BC_REGISTER_LOOPER called without request [ 975.438336] binder: 27915:27916 ERROR: BC_ENTER_LOOPER called after BC_REGISTER_LOOPER [ 975.448667] binder: 27915:27916 transaction failed 29189/-22, size 0-0 line 2834 [ 975.451706] attempt to access beyond end of device [ 975.471252] loop0: rw=12288, want=12296, limit=20 [ 975.483957] binder: 27915:27919 BC_FREE_BUFFER u0000000000000000 no match [ 975.502474] F2FS-fs (loop0): Failed to get valid F2FS checkpoint 03:33:31 executing program 5: syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000640)) getrandom(&(0x7f0000000040)=""/148, 0x94, 0x0) write$P9_RRENAME(0xffffffffffffffff, &(0x7f0000001c00)={0x7}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.swap.current\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001b40), &(0x7f0000001b80)=0xc) getresgid(&(0x7f0000001bc0), &(0x7f0000001c40), &(0x7f0000001c80)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000001e40), &(0x7f0000001e80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001ec0), &(0x7f0000001f00)=0xc) getresgid(&(0x7f0000003680), &(0x7f0000001f80), &(0x7f0000001fc0)) getpgid(0x0) stat(&(0x7f0000002000)='./file0\x00', &(0x7f0000002040)) getgroups(0x0, &(0x7f00000020c0)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000002300)) stat(&(0x7f0000002340)='./file0/file0\x00', &(0x7f0000002380)) fstat(0xffffffffffffffff, &(0x7f0000002400)) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000002480)) getresuid(&(0x7f00000024c0), &(0x7f0000002500), &(0x7f0000002540)) getegid() ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000002580)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000025c0)={{{@in6=@remote, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f00000026c0)=0xe8) stat(&(0x7f0000002700)='./file0\x00', &(0x7f0000002740)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000027c0)={{{@in=@dev, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f00000028c0)=0xe8) getegid() getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002c00)={{{@in6=@local, @in=@rand_addr}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000002d00)=0xe8) stat(&(0x7f0000002d40)='./file0\x00', &(0x7f0000002d80)) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002e00)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000002f00)=0xe8) lstat(&(0x7f0000002f40)='./file0\x00', &(0x7f0000002f80)) getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003000)={{{@in=@rand_addr, @in6=@remote}}, {{@in6=@remote}, 0x0, @in6}}, &(0x7f0000003100)=0xe8) stat(&(0x7f0000003140)='./file0\x00', &(0x7f0000003180)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003200)={{{@in, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000003300)=0xe8) getresgid(&(0x7f0000003340), &(0x7f0000003380), &(0x7f00000033c0)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000006d80)='./cgroup.net/syz1\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000006e00)={0x0, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000006dc0)='IPVS\x00'}, 0x30) fstat(0xffffffffffffffff, &(0x7f0000006e40)) stat(&(0x7f0000006ec0)='./file0\x00', &(0x7f0000006f00)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006f80)={{{@in=@rand_addr, @in6=@ipv4={[], [], @remote}}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000007080)=0xe8) getgid() gettid() lstat(&(0x7f00000070c0)='./file0\x00', &(0x7f0000007100)) getgid() gettid() lstat(&(0x7f0000007180)='./file0\x00', &(0x7f00000071c0)) getegid() getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000008440)={{{@in6, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@remote}}, &(0x7f0000008540)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000008580)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000008640), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9660fc0c16b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3a04257520c2513400000007f") keyctl$set_reqkey_keyring(0xa, 0x0) open(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) [ 975.529270] binder: 27915:27919 ERROR: BC_REGISTER_LOOPER called without request [ 975.609190] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 975.617854] binder: 27915:27919 ERROR: BC_ENTER_LOOPER called after BC_REGISTER_LOOPER [ 975.646846] F2FS-fs (loop0): Can't find valid F2FS filesystem in 1th superblock [ 975.657848] attempt to access beyond end of device [ 975.666163] loop0: rw=12288, want=8200, limit=20 [ 975.674957] attempt to access beyond end of device [ 975.681972] loop0: rw=12288, want=12296, limit=20 [ 975.692130] F2FS-fs (loop0): Failed to get valid F2FS checkpoint [ 975.693687] binder: 27915:27919 transaction failed 29189/-22, size 0-0 line 2834 [ 975.713740] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 975.726300] F2FS-fs (loop0): Can't find valid F2FS filesystem in 1th superblock [ 975.741864] attempt to access beyond end of device [ 975.763583] loop0: rw=12288, want=8200, limit=20 [ 975.772083] attempt to access beyond end of device 03:33:31 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0xc, 0x2009, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000100)}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)) eventfd(0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000180)) memfd_create(&(0x7f0000000080)=']{\x00', 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000280), &(0x7f00000002c0)=0x4) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0)) mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000440)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000640)=""/133, &(0x7f0000000580)=0x85) mmap$binder(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000340)={0xffffffffffffffff, &(0x7f0000000500), &(0x7f0000000640)}, 0x20) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f0000000300)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") [ 975.816611] loop0: rw=12288, want=12296, limit=20 03:33:31 executing program 3: getresuid(&(0x7f00000001c0), &(0x7f0000000180), &(0x7f00000003c0)) lsetxattr$trusted_overlay_nlink(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.nlink\x00', &(0x7f0000000540)={'L+', 0xd4}, 0x28, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x0, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") socket$packet(0x11, 0x0, 0x300) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) socket$netlink(0x10, 0x3, 0x0) openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000003c0), 0x4) syz_genetlink_get_family_id$fou(&(0x7f0000000480)='fou\x00') sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000080), 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x14}, 0x14}}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'team0\x00'}) getuid() setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, 0xe8) semget(0xffffffffffffffff, 0x0, 0x0) semtimedop(0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000400)={0x77359400}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) pipe2(&(0x7f0000000440), 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000d80)='cpuset.effective_mems\x00', 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080), 0x1) [ 975.856271] F2FS-fs (loop0): Failed to get valid F2FS checkpoint 03:33:31 executing program 0: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000940)='net/ip_vs_stats_percpu\x00') prctl$setname(0xf, &(0x7f0000000040)='\x00') gettid() fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) getpgrp(0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000002c0)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000e80), &(0x7f0000000ec0)=0xc) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_tcp(0x2, 0x1, 0x0) pipe2(&(0x7f0000000180), 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000440)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000a40)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c80)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000000d80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000dc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000e00)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002f00)={{{@in, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000e40)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000030c0)={{{@in, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@multicast1}}, &(0x7f00000031c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000005700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000005740)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f000000a3c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a400)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a440)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f000000a540)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a640)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000a740)={@multicast2, @dev}, &(0x7f000000a780)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a7c0)={@remote}, &(0x7f000000a800)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f000000ab40), &(0x7f000000ab80)=0x14, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f000000d640), 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000011900)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@dev}}, {{@in6=@remote}}}, &(0x7f0000011a00)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000018100), 0x0, 0x0, &(0x7f0000018300)={0x77359400}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000018a00)={&(0x7f0000000340), 0xc, &(0x7f00000189c0)={&(0x7f0000018340)={0x14}, 0x14}}, 0x0) accept(0xffffffffffffffff, &(0x7f00000001c0)=@can, &(0x7f00000005c0)=0x80) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000380)={@empty, @loopback}, 0xfffffffffffffe7a) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f0000000280)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x64) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) syz_execute_func(&(0x7f00000003c0)="42805da0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3420f520c25130000007f") sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080), 0xc, &(0x7f0000000140)={&(0x7f0000000600)=@newqdisc={0x24}, 0x24}}, 0x0) 03:33:31 executing program 1: setitimer(0x1, &(0x7f0000000040)={{0x0, 0x7530}, {0x0, 0x7530}}, &(0x7f0000000080)) setitimer(0x1, &(0x7f0000000180)={{0x0, 0x2710}}, 0x0) fstat(0xffffffffffffff9c, &(0x7f0000000280)) setuid(0x0) sysfs$1(0x1, &(0x7f0000000600)='/dev/full\x00') unlink(&(0x7f0000000300)='./file0\x00') socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000000c0)) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f00000001c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000340)=0x10) keyctl$set_reqkey_keyring(0x4, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) getgroups(0x0, &(0x7f0000000200)) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f00000003c0)={0x18}, 0x18) setgroups(0x0, &(0x7f0000000240)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x1c) dup(0xffffffffffffff9c) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000240)) capset(&(0x7f0000000280), &(0x7f00000002c0)) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) getpgid(0x0) syz_open_pts(0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000640)="428055a08f6969ef69dc00d9c4e17911466fc841ff0f1837c4c3397c2a060f38211a40a52e67660f383cc5e50f50e67579c421a22a04a00f2e1a1a0126460fe4e731a3b786e2989f7f") seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getuid() syz_execute_func(&(0x7f0000000200)="42805da0320fef69dc0f01eece73fe19fa380f38211af3f242d2be00000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:33:31 executing program 2: clock_gettime(0x4, &(0x7f0000000500)) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) clock_settime(0x0, &(0x7f0000000040)={0x77359400}) futex(&(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) getitimer(0x0, &(0x7f0000000300)) openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000380)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @loopback}, &(0x7f0000000480)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'veth1_to_bond\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000600)=0x14, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000680)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000006c0)={'rose0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in=@multicast1, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000008c0)={@local}, &(0x7f0000000900)=0x14) accept4(0xffffffffffffffff, &(0x7f0000000a00)=@hci, &(0x7f0000000a80)=0x80, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000ac0)={{{@in6, @in=@dev}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000bc0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002f00)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@local}}, {{@in=@rand_addr}}}, &(0x7f0000003000)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000003100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000003140)=0x14) accept$packet(0xffffffffffffffff, &(0x7f00000031c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003200)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003240)={{{@in6=@dev, @in6=@local}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in6=@local}}, &(0x7f0000003340)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003c40)={0x0, @empty, @remote}, &(0x7f0000003c80)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003cc0)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003d00)={@remote}, &(0x7f0000003d40)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 03:33:20 executing program 5: keyctl$set_reqkey_keyring(0x4, 0xfffffffe) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000280), &(0x7f00000002c0)=0x4) ioctl$KVM_UNREGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae68, &(0x7f0000000300)) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000004c0)={0x0, 0x7530}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000180), 0x8) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) arch_prctl(0x0, &(0x7f0000000480)) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000440)) connect$unix(0xffffffffffffffff, &(0x7f0000000380)=@abs, 0x6e) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000001d00), &(0x7f0000001d40)=0x8) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000001d80), &(0x7f0000001dc0)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000001e00), &(0x7f0000001ec0)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000002100), &(0x7f0000002140)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000002180), &(0x7f00000021c0)=0x10) sendmmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000044c0), 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100), 0x28) prctl$setmm(0x23, 0x0, &(0x7f0000ffb000/0x4000)=nil) sendto$inet6(0xffffffffffffffff, &(0x7f00000005c0), 0x100e04, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_open_dev$mice(&(0x7f0000000580)='/dev/input/mice\x00', 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000400)=ANY=[], 0x0) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:33:20 executing program 3: keyctl$set_reqkey_keyring(0x15, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") execve(&(0x7f0000000540)='./file0/file0\x00', &(0x7f00000006c0), &(0x7f0000000800)) openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) gettid() getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000000b00)=0xc) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f00000004c0)=ANY=[], 0x0, 0x0) gettid() setsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0xfffffffffffffc76, &(0x7f0000000100)}, &(0x7f0000000400)=0x19b2f6d5b2d2017a) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000440), &(0x7f0000000480)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) 03:33:20 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffff9c, 0x0, 0x5, &(0x7f0000000140)='bpq0\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0320fef69dc0f01eece73fe19fa380f38211af3f242d2be00000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000340)={'bpq0\x00', @ifru_map}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @multicast2, 0x0, 0x0, 'fo\x00'}, {@local}}, 0x44) dup(0xffffffffffffffff) personality(0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000300)) add_key(&(0x7f0000000000)='big_key\x00', &(0x7f0000000040), &(0x7f0000000680), 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f00000001c0)="428055a0c6660f54fe9038e379392a8e0f38211a64a741fff040d9fbe5e5417545800f2e1a1a01460f01ee31a3b786e298262e6426f30f2b0509000000bd3f") 03:33:20 executing program 1: prctl$intptr(0x400000000004, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) getpgrp(0x0) prlimit64(0x0, 0x0, &(0x7f0000000040), &(0x7f00000002c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000380)) sysfs$2(0x2, 0x0, &(0x7f0000000140)=""/250) mq_open(&(0x7f0000000540)='\x00', 0x0, 0x0, &(0x7f0000000580)) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='net/tcp6\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0690fef69dc0f01ee0dce41ff0fc4a33d062900370f38211ac4410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000003c0)=ANY=[]) 03:33:20 executing program 4: syz_emit_ethernet(0x35d, &(0x7f0000000080)={@link_local, @random="49fe09004740", [], {@ipv6={0x86dd, {0x0, 0x6, "ac77ec", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @empty, {[], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @dev}}}}}}, 0x0) 03:33:20 executing program 2: rt_sigpending(&(0x7f0000000040), 0x8) timerfd_create(0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000400)='vmnet1ppp1+.vmnet0\x00', 0x0) accept4(0xffffffffffffffff, &(0x7f0000000840)=@alg, &(0x7f0000000180)=0x80, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000440)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f00000003c0), 0xc, &(0x7f0000000600)={&(0x7f00000004c0)=ANY=[]}}, 0x0) add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f00000028c0), 0x0, 0x0, 0xfffffffffffffff9) add_key$user(&(0x7f0000003bc0)='user\x00', &(0x7f0000003c00), &(0x7f0000003c40), 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000240)={@dev}, 0x20) prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0xfffffffffffffec5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") 03:33:20 executing program 4: set_tid_address(&(0x7f0000000440)) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000000c0)='yeah\x00', 0x5) socket$netlink(0x10, 0xffffffe0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180), 0x0, 0x0, 0x0) keyctl$update(0x2, 0x0, &(0x7f00000001c0), 0x0) inotify_init1(0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000400)) syz_open_dev$dspn(&(0x7f0000000a00)='/dev/dsp#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000900)=ANY=[]) prctl$getname(0x10, &(0x7f0000000200)=""/133) semget$private(0x0, 0x0, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000000380), &(0x7f0000000680), &(0x7f00000006c0)) fstat(0xffffffffffffffff, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000880)=0xc) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f00000017c0)) getgroups(0x0, &(0x7f0000000a80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000ac0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b00)={{{@in6=@ipv4={[], [], @loopback}, @in6=@ipv4={[], [], @local}}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000c00)=0xe8) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000d00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d40), &(0x7f0000000d80)=0xc) lstat(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000e00)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001580)) getresuid(&(0x7f00000015c0), &(0x7f0000001600), &(0x7f0000001640)) getgid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001700), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:33:20 executing program 2: timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x1, @tid=0xffffffffffffffff}, &(0x7f0000000200)) timer_getoverrun(0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:33:20 executing program 3: keyctl$set_reqkey_keyring(0x15, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") execve(&(0x7f0000000540)='./file0/file0\x00', &(0x7f00000006c0), &(0x7f0000000800)) openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) gettid() getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000000b00)=0xc) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f00000004c0)=ANY=[], 0x0, 0x0) gettid() setsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0xfffffffffffffc76, &(0x7f0000000100)}, &(0x7f0000000400)=0x19b2f6d5b2d2017a) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000440), &(0x7f0000000480)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) 03:33:21 executing program 0: prctl$setname(0xf, &(0x7f0000000440)='\b\x00\x00\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getpid() geteuid() lstat(&(0x7f0000000400)='./file1\x00', &(0x7f0000000500)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000580)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in=@broadcast, @in=@remote}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000ac0)) geteuid() getgroups(0x0, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c40), &(0x7f0000000c80)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getresuid(&(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80)) stat(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000e00)) gettid() fstat(0xffffffffffffffff, &(0x7f0000000e80)) stat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000fc0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001000)) getpgrp(0x0) getuid() stat(&(0x7f0000001080)='./file0\x00', &(0x7f00000010c0)) getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002340)={{{@in=@dev, @in6=@local}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000002440)=0xe8) getresgid(&(0x7f0000000080), &(0x7f00000024c0), &(0x7f00000000c0)) fcntl$getown(0xffffffffffffffff, 0x9) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da0aa878769ef69dc00d9ce200441ffff1833c423fbf07b030d0f38211ac4c19086fbd9f28f6744adc90feefa4e2179fb237532c6c62e6736660f2d83000000000d64ac1e5da358b706b79866f046fe4ee57f") 03:33:21 executing program 1: prctl$setname(0xf, &(0x7f0000000180)='^proc)procbdev+(^eth0&wlan0nodevsecurity\'[!eth0\x00') msync(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000340)='^proc)procbdev+(^eth0&wlan0nodevsecurity\'[!eth0\x00', 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000140)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {}, {}, @rumble}) ftruncate(0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000480)=ANY=[], &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") write$P9_RSYMLINK(0xffffffffffffffff, &(0x7f0000000080)={0x14}, 0x14) 03:33:21 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000040)) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x4200, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) getrusage(0xffffffffffffffff, &(0x7f0000000480)) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000002c0)='hybla\x00', 0x6) bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @multicast1}, 0x10) r3 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(0xffffffffffffffff, 0x40485404, &(0x7f00000003c0)={{0xffffffffffffffff, 0x3, 0x0, 0x0, 0x5}, 0x0, 0x9}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000300)) setrlimit(0x0, &(0x7f0000000200)={0x0, 0xfffffffffffffffa}) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x52, 0x1f, 0x0, 0x1f, 0x6, 0x4, "674916d480de0a9ef7ba3b736d2a55ab134ce5d566f3a94e7a7943090c1705c9319e84185f70978a18599a3fb67ca7825727437e9e11f38e6330deb25868c5eb", "123f29ccec6867a934fc8125cc1c308836303dde5432ef993a580380f6c073e35d2d536bca15503a9962f5340270fc786f2f86206fd2578af950710236e43d8c", "f770caaad9d1f82ff7faa3e4293ee6bf4139b99e9c347e040eefa2787e8d76b6", [0x3, 0x5]}) ioctl$SNDRV_TIMER_IOCTL_START(r2, 0x54a0) ioctl$KDSKBLED(r0, 0x4b65, 0x1) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x4) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0xff6c, 0x4401000000000000, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) ioctl$PPPIOCSMRU(r3, 0x40047452, &(0x7f0000000440)=0x95cf) getpgrp(0xffffffffffffffff) getresuid(&(0x7f0000000380), &(0x7f00000006c0), &(0x7f0000000700)) fstat(r4, &(0x7f0000000740)) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000007c0)) fstat(r2, &(0x7f0000000800)) getpid() getresuid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000ec0), &(0x7f0000000980)=0xffffffffffffffd5) getpid() ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000ac0)) fstat(r4, &(0x7f0000000b00)) lstat(&(0x7f0000000b80)='./file0\x00', &(0x7f0000000bc0)) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f0000000c40)) getgid() sendmmsg$unix(r3, &(0x7f0000001f40)=[{&(0x7f0000000e40)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000001f00)=[{&(0x7f0000000f00)="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", 0x1000}], 0x1, 0x0, 0x0, 0x4040045}], 0x1, 0x11) 03:33:21 executing program 4: getrandom(&(0x7f0000000200)=""/148, 0x340, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") sync() setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000180), 0x4) time(&(0x7f0000000340)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in6=@remote, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f00000008c0)=0xfffffffffffffe9e) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000840)={@mcast2}) setrlimit(0x0, &(0x7f0000000040)) seccomp(0x0, 0x0, &(0x7f0000000100)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000880)='system.posix_acl_access\x00'}, 0x10) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000a80)='trusted.overlay.origin\x00', &(0x7f0000000ac0)='y\x00', 0x2, 0x0) pipe2(&(0x7f0000000080), 0x0) getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@local, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@ipv4={[], [], @rand_addr}}}, &(0x7f00000002c0)=0xe8) getuid() getresuid(&(0x7f0000000300), &(0x7f0000000580), &(0x7f00000005c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000000c0)) getgroups(0x0, &(0x7f0000000900)) getpgid(0xffffffffffffffff) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x16, &(0x7f00000010c0)='em0ppp1vboxnet1md5sum\x00', 0xffffffffffffffff}, 0x30) fstat(0xffffffffffffffff, &(0x7f0000001140)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001640), &(0x7f0000001840)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001880), &(0x7f00000018c0)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001900)) getgid() getegid() 03:33:21 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fstat(r1, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000040)="e91f7189591e9233614b00", r2, r3) 03:33:21 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) write$binfmt_aout(r0, &(0x7f0000003480)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x10001}, "", [[]]}, 0x120) 03:33:21 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) write$binfmt_aout(r0, &(0x7f0000003480)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x10001}, "", [[]]}, 0x120) 03:33:21 executing program 3: keyctl$set_reqkey_keyring(0x15, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") execve(&(0x7f0000000540)='./file0/file0\x00', &(0x7f00000006c0), &(0x7f0000000800)) openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) gettid() getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000000b00)=0xc) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f00000004c0)=ANY=[], 0x0, 0x0) gettid() setsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0xfffffffffffffc76, &(0x7f0000000100)}, &(0x7f0000000400)=0x19b2f6d5b2d2017a) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000440), &(0x7f0000000480)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) 03:33:21 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) write$binfmt_aout(r0, &(0x7f0000003480)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x10001}, "", [[]]}, 0x120) 03:33:22 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) write$binfmt_aout(r0, &(0x7f0000003480)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x10001}, "", [[]]}, 0x120) 03:33:22 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, &(0x7f0000000300)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) close(r1) socket$packet(0x11, 0x3, 0x300) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) 03:33:22 executing program 0: keyctl$set_reqkey_keyring(0x3, 0x0) pipe(&(0x7f00000001c0)) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f0000000280)) setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, &(0x7f00000007c0), 0x4) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000780)={0x18}, 0x18) open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000680)) getpgid(0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000640)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) finit_module(0xffffffffffffffff, &(0x7f0000000100)='wlan1{cpuset[vmnet1eth1', 0x0) semget(0xffffffffffffffff, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000700)) 03:33:22 executing program 2: timerfd_create(0x0, 0x0) socket$packet(0x11, 0x0, 0x300) finit_module(0xffffffffffffffff, &(0x7f0000001fc0)='team\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) socket$inet(0x2, 0x0, 0x0) mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) prctl$getname(0x10, &(0x7f0000000540)=""/1) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000380), 0x144) syz_execute_func(&(0x7f0000000600)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f78990f7beefafa2179660f38302fe5e54175450f2e1a400fbcc1c44379dfb9d6adbe90dfe2989f3f") socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') memfd_create(&(0x7f0000000400)='-system]md5sumtrustedqeth0\x00', 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440), 0x12) socket(0x0, 0x0, 0x0) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), &(0x7f0000000340)=0x4) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, &(0x7f0000000140)) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000003c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@local, @in6=@local}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f00000000c0)=0xe8) setxattr$trusted_overlay_nlink(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='trusted.overlay.nlink\x00', &(0x7f0000000500)={'L-', 0x7}, 0x28, 0x0) 03:33:22 executing program 4: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000057c0), &(0x7f0000005800)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005840), &(0x7f0000005880)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000058c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005900)={{{@in6=@dev}}, {{}, 0x0, @in=@loopback}}, &(0x7f0000005a00)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005a40), &(0x7f0000005a80)=0xc) syz_open_dev$sndctrl(&(0x7f0000005ac0)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000005b00)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005b40)={{{@in6=@dev, @in=@dev}}, {{@in=@rand_addr}, 0x0, @in6=@local}}, &(0x7f0000005c40)=0xe8) lstat(&(0x7f0000005c80)='./file0\x00', &(0x7f0000005cc0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000006100)) fstat(0xffffffffffffffff, &(0x7f0000006140)) stat(&(0x7f00000061c0)='./file0\x00', &(0x7f0000006200)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000062c0), 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) 03:33:22 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000040)) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x4200, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) getrusage(0xffffffffffffffff, &(0x7f0000000480)) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000002c0)='hybla\x00', 0x6) bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @multicast1}, 0x10) r3 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(0xffffffffffffffff, 0x40485404, &(0x7f00000003c0)={{0xffffffffffffffff, 0x3, 0x0, 0x0, 0x5}, 0x0, 0x9}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000300)) setrlimit(0x0, &(0x7f0000000200)={0x0, 0xfffffffffffffffa}) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x52, 0x1f, 0x0, 0x1f, 0x6, 0x4, "674916d480de0a9ef7ba3b736d2a55ab134ce5d566f3a94e7a7943090c1705c9319e84185f70978a18599a3fb67ca7825727437e9e11f38e6330deb25868c5eb", "123f29ccec6867a934fc8125cc1c308836303dde5432ef993a580380f6c073e35d2d536bca15503a9962f5340270fc786f2f86206fd2578af950710236e43d8c", "f770caaad9d1f82ff7faa3e4293ee6bf4139b99e9c347e040eefa2787e8d76b6", [0x3, 0x5]}) ioctl$SNDRV_TIMER_IOCTL_START(r2, 0x54a0) ioctl$KDSKBLED(r0, 0x4b65, 0x1) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x4) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0xff6c, 0x4401000000000000, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) ioctl$PPPIOCSMRU(r3, 0x40047452, &(0x7f0000000440)=0x95cf) getpgrp(0xffffffffffffffff) getresuid(&(0x7f0000000380), &(0x7f00000006c0), &(0x7f0000000700)) fstat(r4, &(0x7f0000000740)) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000007c0)) fstat(r2, &(0x7f0000000800)) getpid() getresuid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000ec0), &(0x7f0000000980)=0xffffffffffffffd5) getpid() ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000ac0)) fstat(r4, &(0x7f0000000b00)) lstat(&(0x7f0000000b80)='./file0\x00', &(0x7f0000000bc0)) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f0000000c40)) getgid() sendmmsg$unix(r3, &(0x7f0000001f40)=[{&(0x7f0000000e40)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000001f00)=[{&(0x7f0000000f00)="d54b8ead48301836012432db665f3706785089f32f5455222488f16ff31869e42716d394ffc7d3161af6e90b31965c730274b06133022e968f98aee875ec6da4a67788af2ac26a8b81d57fafb496667b0ba170d38dbf5b8a1c0208489978ac5125cf7aaeb7ad81cf605099c2630bdba440c8e32c2179c0f607a0b885ee988d2dcd3253e59799360ec3a466cbc5147bfb569057eef551cbd744b851b6ad336742c486fbf70acf9c252b8c6699de947a2103b6d913f19e1fc57415e51e782ebb036afa9b994ef494d367385e68d40ca1eb1bacd1129ad799cbd3a33561c288350a0db1ab34b8971e4de4c5c8dfeaa2d620a591388453fdf089e67bdcc4f68acfb490143902d3dfbb26ad258ad3ab7cbbaaa8135c1de8d22b8e299dc03149f28f5cae72703bb11f751393327ebad73ae175154214f1c556e7ad680af2896ac6ea157d1c79a0570d94ef04bfd90e234e6ebeb01164dd9cccb29bc9de3563eaad3877d5b7c6413e4c4eada291aab0b8a07760643d4b3ab5a3530ef9489efea76311e0ac6e3c4ae2dd9f8c304ef02ecabead86e9e99060c271a8e27e25ee6a0b15ade65eaca0353c4e6cce7f0da657ea2788220062ec7de6a018c31aca9c0fa35ba5c69e44775d413e2a608e32e87c0e8fd61a2723d4fefd949c515014afc824b8421c5da923a869eebcf7ac91549ccca306949e9a54bc34652c59c4e1b47267bc51f9803780f2bcf04b6ca116f96ee9efcb5cb7534e6101af8fd180459bf1aa72feca2bef52852f5cfa655113678f47f0465a79efa660f50ef10a210b7bf692f3a764ed3a09c2d10997959603df77e2e08cfb7abe49100a606eebd08e4f284d2062430a3fbead0eb403b3c0fcba9cc222b4b0c75fabf696946e733593009ec921859f7737d14b0188ba6e05e354cf9504d613545ccf6f4c11742f25de37661a376353fd7199ba222dfd2ab8fdd5a2017190b987ce802ef497d888d188553fcf9779adf27b10a42a676f7814b48cff1b7effe58f817098d70134310046b8d7159bbda34d7b086c9733a260f6b7df74dc9fb498adb59818f935c601b0fd4702d034e6ca1b99925f8bd08a58e62b7a9207e1de55b0594b7290dbb6c0818634729ca5f2365753ec9d559583f60adeae70fe4b5d1a77fd02ed5dc928cd08867529187cfb530b25235ef7145cd5cfe9eb659969134cf526bf5dbfc2937e1172c7d502b2941d10b4c01defc5871c115b62faa408ca0b56665ca77f3a432d50802d038f527e6323379a5c150ca702a5b44dd8d8aa979be18b2997a2e8352379f76dbe967f19542fcdfd277ce10078eeffed5bb488f61465624f3586d4c9c708ee61bf5039e965704e10bf7a43457b1a7c380de047f8ddeb3eb5c5487e7669c1b2b234632c5fab53cbcc5376778e6480f1748295c321a68cdddbcbde3f162185e422ea8a8a8613454eebd4666603460e575432295857e62d071678ffa394a522823a1eedaca77d9927b68cb0ba3c44f26a03420172c01a592c51e931f2e7d30bbaa7d2284068bbc39aa56bdc1ac1d45f5d2342cd1e1199ee60e158c4246d21b7835c5221ea63948476187b4d0b2e35940ae0b1c5cd0e4c715f15c1cc7e970861ac4c0c6da3d3f6faa9ec8c0479a09541b71074f4d5acf852c9988f6b0616c80d20abe0cb7f0f84d5eb4efba1397ecb26586e4f9e237b941279de0787eacdd1063d273a7b17cc0053240f5eea898789c3c38a24e104e9b0c41c44a753e9b67a0e1b1a022f65e66f15bc89b64d02ed7b4d158247383a40b408233b1964eaa6b343b8578fbaf8171f172697fef9db69ce1e5a87235c1b430ee2c67cdf6c3feed4ce649724c9a20649613dab41e06f1ca859af82569dec9236fe0abf8d8de4ec3d8bab4118debe150e956298e81dd452de8beb2f8472ddd915715cb29fa1a21c71d2a65ff476b3e92c3280c06d284e7c544c32156434003f13edcfe8a95603cbb0bbc97c7d57b703669f5dfc6b574f75a1e70f1c4a58cabd4af3fc964a562d47a81cb6e128f1ef29b81e76288fa3c8dce6b2f8854449dfcc04ab94480dbd34b88f3eee2e710133408c48d296cecc0f07de2c6938cc4346232367b0cb8f982eb7d80af0c7197660670ce85f785ab3faeb5b2f5cf3f3adc600c8fb3f542b9f83266672bad418c7528e7082054ab7fa656294b330130c18b10c7c81675b1ed2c2a272bd801ad75d4581b35cf285f623b1ba09500771786bc180f2871602f3c056d8dd5b0ce3e583fc98e502cb5e36051c496d2fff2ed6dc0065a2ec712d762834f5d8c2aed5b90ef9f11e645c311905a5e82bc927d9894dcd9a163349f8bf10bcf49ed687500310db7dd93aa45b99649347be1abf0c7eef18d25d92f1472d5d3f23805c8ee2458ac08681e4986872641701a60640f9ae4602881719ffceecb411e9936a0f4ba72fac73507bc40f9518ec694d9a1e9ff33f1080b1eb5e94634d6318688b7875a56f163d1dcd533cd00839c3f8901a65bbef2359bad680eee460c9c3f97bdb3cbf73bc4bd5b3493af5651d4f4dbfe10a733c43e6a0e9600dd2a2c73669d2da6b8e24e4b15fa091c546a85a4c653548a4fcdc46f646cfa199d8e0da2cc9256b09a0dd523196ae11cd50f6add125f3dd531b20c3b0a1093de4c320abcf8d25868fe8cff31f7dc8846f27529203133349d232d55107d3e4e03c9d59f479b78f604ba22b5317fb53df8bd82f2d654d4d59ddeef0a2127ce3fa32e97e51d0d2695bd8ea3d042668bf2ad96501b01daf6b8b13552364d6f7de973809158089d44d65346f612f2ebb98d96df73b306536c580737fa76fc06120646d6699e49c2517179bf7ab43771f0fe8c9ecb2c205ff78a8c2cd702d61301a639d92fd50e1e0af714256ab19dc7731ff1092ad3db076f10120869f3fc1f66afc57f8291dad8d3bee520ca67ccf2f73802ed9e2a9a662d20aa6aed54707190f6c205d745f335756fc611b5d4453dfa548fb4dd3cb365b25195eb667de1a2cd5033c6cd31c1444e0c8f61b6eae3332a753f5de28833f82bd3893a79adb6fa1e424a342eaf505c0944d212f78560564c66ad75f4f14fdcabe00d9b764ac469f1256d24b2f070ac05a313f60ea8888154741303705c7beffd29832b4eaa2a713d9eda10299f788e05d4145214e14823a530fb13daefeab52fb26ee813dfc46610490997db430cf3cbd1683835b2548fb067cfdd2f9e0a3b7e423958b0f7da009115715272cd542628e5bed4d8ef6ae46c983d602aafff6e820a82089593330f57700ebc4a496d11a853da84f3313903cba799170e5936b48abdbe1911d272ebb8d08e37b3dfa1231db48af16c51265d46c4c3d29963857c371bbb8513eb6ff2a5f942d5c1797c4b23761d8d272b2b4cd7610f8a2892269d325ea3b325e544f1d93b42597a55fed115d28c7b78c4b3b1033a96b4b9d365b3a083849fd766f9cd4066042b73a7bdd2236c8a1b6099542f5b0dfa6c9f9002dfe9ead4d5f239b2a91522b0451e3d554e386618001a70a1f6f984914f4949d0bbb2a30741a7256e8671b8fad0a3128b53ab347c91ad555f799419069c8aa197e1d959a0473266ea12bf539667b23cab30d13bd0dd29036e55f34eabc17d74a84adeea1b011b164ed8dde018dec8233d3434d551882b887efc8cfe5f727f509cc979af8bc4fbff375b0a028e02b5482b9825f47d28dd494463da357f5963e43fa8bd99d161f4327437f380adf3a7978190635b412636a1b2e30296f27da9ac70db6b357e8781133a81ec9cd0821c037afa5c177f7e2af2e83c29ec28e07414bc2c01c03d79cfe93644a7d5307dfabd08eb1376a53a741ca4e421d02ad168370d7023c957e089523c218f8ed4b79e60e440ec694c9bb0d57ced1e4470a2dd52258121c19091adc17ac03943b8cfee9995d9f094b60ec7177baaed1f2effc1e2ff3743b8cfe2dc61bf40af013dc98d0b5d9d84fd5faeffcaf83e96d26716c43e1ca85a54571f8743749bf4dd5ed560e602be2ef33c3ff25349f409c8f3f3cea2e85cf693cd6567effe9f4596862ab57c54689ad1e7c187507ee7c2d9dfada0bf8399ea5f4d3e10b749d5895b97e216b80a588e6c7eba416f26d0d030f0c893a70613aaf553d6b979b11a6301534cb716be292f45ba71b8ba27063985b3deeb52b7f5b80a3091409dde911cb823ecc02547d9d08cb1a9daf6368d197ba7d9e180394ff6df0bb925e40f5add64a5ec4ad48220e641467f1ba49f13928f090d59c4fe26af802c7270f5d7562850adfaf8cc234b53be3d095661827dfadff86293544d466d75349d65b0e4cc00f14aa2977fc522a3ddc4307c30910a5ea96dcd699fdb478859c341e8b2640d6147278544198c550e72647180394a7e10961c981f4191b5513634e35550e9bbad0499a7065a06939163256acab76992a84c3310dc5d5e3dc24b291a3861633e4b593191da4bf054c5bb3c66317f1d4d14251d1566cf02e932a96d89c09037f4b0f90fb8fbc0eb3ae8fc7d7f6f38663e08b283c2ad43e037d8bb1ab660e0053108b788792706eaedea35231dea8501b8c68c0187c0ffcdf563b1feb5ec4f3e3a1db77f5f7173209c9b4805326ad8c711e1dfd25f98cbaffd5664c8c79256367bb063112500d4cf5a4e1efe47655931f1424141221fb4e8350b91280cf29cb63a533b4df32fac3f60cd02afa8ba1a95069c3bd2a2e9a4efe8ebfbce5d82b862109933610c3e4dd0b7b0c4e57427659f7251e1f9f4d779aaae16af141242faf983b1d9560b31b51b824a1734fc0ad10bd6dadc046b99f5815a5c514601dc8a081893e605b01c39fad32b11fa18e520a00a00b27ff5cff6f44aa92ccac3b9a61b121a730a8e0b697d31dc7ed96fed0a9441cdb4ecce6be42dd1dea661d56f5dd7abd49eed494ef1bc8b09b07c9206efd7c80ad8552928aa90d54d276343c5246a8b046e7e284fdb585c51d26c401503100e7b1e7003067786cb91ef1eceac1be33a23352c896646f4df3310d67181b95c6ff17441fc77c8ca87547eb04ed533ea4eb9663e0147579ec8b1cd4af3033929dfa5fb053f8358ec364fc8cbc58cc965727b42182d776bd5d63a226ada0211cbf49f9230cac12c647047dd376679fecbc7d2ffdce2b10ab50e5c43b86a83c578e453ba4bf95f8f0b89078ea4aabcef9d1cc8158eabdb5f1825382081c2326d9456b1f1b37f4ff781733cee63e2db492e01512837c41f4c4bf2cd0d9e5afcf4143ba8371b29cfad1ece7811623ec0c6b63146676be3187277bf34f4113c8cc8e08fe807afc996ad2f7ec632daa5037a1e23213c7a3f7528ff6680799d94c2e2718eb02173d4e752c49af5cf6c2ce05d07d1077ad77bd3e1a27fc80f6e8e071259ebfca707c9dd468ecd8a4dc7376196fa552779ed68f362a6a4bc879c9ad3d6fcb0dabafdfef1054cf27ab083274231634787155a76a2a3f5777e550b369e53db57424d91a0e927592c3af2fa0d30388d8c57b0b7419f9086a29f4614acbfbbf00e092411fca7a94fc0af8450ab0749ffcc1f91ad6b959effc89ba7275eb551e639489ac86840cb47f420f67e147a947e2d9a12fde1bd20bf323822628b586acb8fe34b2d1f3db9fa52a1e11fd145f677d604fe424cdeeb3f68d5ad1d6d0fcc9d911d4ac2f5e8a9dcd4108b05edb694d17465fdc7bbf381705a80c05bbfd5a3742ed5a1323a266973a8835b4d474aedf49bf1baaf7f3e54949109df2f4927749ed585e449435001c3712629e4cdebdebe2e7ad9e056bb99c1987e06dfce27496ef53", 0x1000}], 0x1, 0x0, 0x0, 0x4040045}], 0x1, 0x11) 03:33:22 executing program 1: mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) keyctl$set_reqkey_keyring(0x11, 0x0) pipe(&(0x7f0000000780)) prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) truncate(&(0x7f0000000400)='./file0\x00', 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000540)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") seccomp(0x0, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000006c0)}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) connect(0xffffffffffffffff, &(0x7f0000000340)=@xdp, 0xfffffffffffffebf) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f0000000140)}, 0x10) inotify_init1(0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)) getsockname$packet(0xffffffffffffff9c, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001540)=0x14) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000001580)={@local}) syz_execute_func(&(0x7f0000000640)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:33:22 executing program 1: mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) keyctl$set_reqkey_keyring(0x11, 0x0) pipe(&(0x7f0000000780)) prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) truncate(&(0x7f0000000400)='./file0\x00', 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000540)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") seccomp(0x0, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000006c0)}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) connect(0xffffffffffffffff, &(0x7f0000000340)=@xdp, 0xfffffffffffffebf) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f0000000140)}, 0x10) inotify_init1(0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)) getsockname$packet(0xffffffffffffff9c, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001540)=0x14) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000001580)={@local}) syz_execute_func(&(0x7f0000000640)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:33:22 executing program 3: keyctl$set_reqkey_keyring(0x15, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") execve(&(0x7f0000000540)='./file0/file0\x00', &(0x7f00000006c0), &(0x7f0000000800)) openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) gettid() getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000000b00)=0xc) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f00000004c0)=ANY=[], 0x0, 0x0) gettid() setsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0xfffffffffffffc76, &(0x7f0000000100)}, &(0x7f0000000400)=0x19b2f6d5b2d2017a) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000440), &(0x7f0000000480)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) 03:33:23 executing program 1: mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) keyctl$set_reqkey_keyring(0x11, 0x0) pipe(&(0x7f0000000780)) prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) truncate(&(0x7f0000000400)='./file0\x00', 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000540)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") seccomp(0x0, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000006c0)}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) connect(0xffffffffffffffff, &(0x7f0000000340)=@xdp, 0xfffffffffffffebf) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f0000000140)}, 0x10) inotify_init1(0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)) getsockname$packet(0xffffffffffffff9c, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001540)=0x14) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000001580)={@local}) syz_execute_func(&(0x7f0000000640)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:33:23 executing program 0: keyctl$set_reqkey_keyring(0x3, 0x0) pipe(&(0x7f00000001c0)) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f0000000280)) setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, &(0x7f00000007c0), 0x4) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000780)={0x18}, 0x18) open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000680)) getpgid(0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000640)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) finit_module(0xffffffffffffffff, &(0x7f0000000100)='wlan1{cpuset[vmnet1eth1', 0x0) semget(0xffffffffffffffff, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000700)) 03:33:23 executing program 2: memfd_create(&(0x7f0000000180)='!trusted\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001400)={0x0, @local, @loopback}, &(0x7f0000001440)=0xc) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f00000006c0), 0xc, &(0x7f0000001640)={&(0x7f0000001480)=@delqdisc={0x24}, 0x24}}, 0x0) memfd_create(&(0x7f00000017c0)='[\x00', 0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001800)={@multicast1, @dev}, 0x8) io_setup(0x0, &(0x7f0000000040)) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000100)) setxattr$trusted_overlay_nlink(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='trusted.overlay.nlink\x00', &(0x7f00000007c0)={'L-', 0x80000001}, 0x28, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) accept4$unix(0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000280)=0x6e, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000300)) accept4$packet(0xffffffffffffff9c, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000340)={{{@in6, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f00000001c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in=@broadcast, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f00000002c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000540)) semget$private(0x0, 0x0, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000700)={@rand_addr, @local}, 0xc) semctl$SEM_INFO(0x0, 0x0, 0x13, &(0x7f0000000900)=""/189) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xc) getegid() getgroups(0x0, &(0x7f00000006c0)) add_key(&(0x7f0000000800)='dns_resolver\x00', &(0x7f0000000840), 0x0, 0x0, 0xfffffffffffffffc) keyctl$read(0xb, 0x0, &(0x7f00000009c0)=""/234, 0xea) getegid() syz_execute_func(&(0x7f0000000080)="428055a0610fef69dce9d92a5c41ff0f1837370f08211ac4c482fd2520410feefa4e2179fbe5f5450f38c9365de0932ebc2ebc0d64ac1e5d9f7f") 03:33:23 executing program 1: mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) keyctl$set_reqkey_keyring(0x11, 0x0) pipe(&(0x7f0000000780)) prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) truncate(&(0x7f0000000400)='./file0\x00', 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000540)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") seccomp(0x0, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000006c0)}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) connect(0xffffffffffffffff, &(0x7f0000000340)=@xdp, 0xfffffffffffffebf) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f0000000140)}, 0x10) inotify_init1(0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)) getsockname$packet(0xffffffffffffff9c, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001540)=0x14) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000001580)={@local}) syz_execute_func(&(0x7f0000000640)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:33:23 executing program 4: lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000580)) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000880)=""/4096, &(0x7f0000000040)=0x1000) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) sigaltstack(&(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000200)) ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:33:23 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000040)) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x4200, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) getrusage(0xffffffffffffffff, &(0x7f0000000480)) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000002c0)='hybla\x00', 0x6) bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @multicast1}, 0x10) r3 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(0xffffffffffffffff, 0x40485404, &(0x7f00000003c0)={{0xffffffffffffffff, 0x3, 0x0, 0x0, 0x5}, 0x0, 0x9}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000300)) setrlimit(0x0, &(0x7f0000000200)={0x0, 0xfffffffffffffffa}) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x52, 0x1f, 0x0, 0x1f, 0x6, 0x4, "674916d480de0a9ef7ba3b736d2a55ab134ce5d566f3a94e7a7943090c1705c9319e84185f70978a18599a3fb67ca7825727437e9e11f38e6330deb25868c5eb", "123f29ccec6867a934fc8125cc1c308836303dde5432ef993a580380f6c073e35d2d536bca15503a9962f5340270fc786f2f86206fd2578af950710236e43d8c", "f770caaad9d1f82ff7faa3e4293ee6bf4139b99e9c347e040eefa2787e8d76b6", [0x3, 0x5]}) ioctl$SNDRV_TIMER_IOCTL_START(r2, 0x54a0) ioctl$KDSKBLED(r0, 0x4b65, 0x1) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x4) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0xff6c, 0x4401000000000000, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) ioctl$PPPIOCSMRU(r3, 0x40047452, &(0x7f0000000440)=0x95cf) getpgrp(0xffffffffffffffff) getresuid(&(0x7f0000000380), &(0x7f00000006c0), &(0x7f0000000700)) fstat(r4, &(0x7f0000000740)) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000007c0)) fstat(r2, &(0x7f0000000800)) getpid() getresuid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000ec0), &(0x7f0000000980)=0xffffffffffffffd5) getpid() ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000ac0)) fstat(r4, &(0x7f0000000b00)) lstat(&(0x7f0000000b80)='./file0\x00', &(0x7f0000000bc0)) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f0000000c40)) getgid() sendmmsg$unix(r3, &(0x7f0000001f40)=[{&(0x7f0000000e40)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000001f00)=[{&(0x7f0000000f00)="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", 0x1000}], 0x1, 0x0, 0x0, 0x4040045}], 0x1, 0x11) 03:33:23 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={@multicast1, @remote}, 0xc) getsockopt$inet_buf(r0, 0x0, 0x29, &(0x7f0000000000)=""/145, &(0x7f00000001c0)=0x91) 03:33:23 executing program 3: mincore(&(0x7f0000ffe000/0x1000)=nil, 0x1000, &(0x7f0000000080)=""/24) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:33:23 executing program 1: add_key$user(&(0x7f0000000240)='user\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000340)='id_resolver\x00', &(0x7f0000000380), &(0x7f00000003c0), 0x0, 0xfffffffffffffffd) geteuid() add_key(&(0x7f0000000400)='id_resolver\x00', &(0x7f0000000440), &(0x7f0000000480), 0x0, 0xfffffffffffffffc) keyctl$setperm(0x14, 0x0, 0x0) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000bc0)="42805da0a95dde0f3a6086a3088041cb913591913d0629007899442a417934c8c8eefa6466410f51cc302fd0d0451f2e1a3828c40379dfb8d6adbe90dfe29f7f") 03:33:24 executing program 0: keyctl$set_reqkey_keyring(0x3, 0x0) pipe(&(0x7f00000001c0)) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f0000000280)) setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, &(0x7f00000007c0), 0x4) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000780)={0x18}, 0x18) open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000680)) getpgid(0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000640)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) finit_module(0xffffffffffffffff, &(0x7f0000000100)='wlan1{cpuset[vmnet1eth1', 0x0) semget(0xffffffffffffffff, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000700)) 03:33:24 executing program 2: futex(&(0x7f0000000040), 0x6, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) clock_gettime(0x0, &(0x7f0000000680)) socket$inet_icmp_raw(0x2, 0x3, 0x1) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000003c0)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in=@remote, @in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, 0xe8) fstat(0xffffffffffffffff, &(0x7f0000000340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000640)='./file0\x00', 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000600)) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@remote, @remote}, &(0x7f0000000580)=0x8) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa37b90f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c48235905c5f13c4c3916efafe9f7f") fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) futex(&(0x7f0000000280), 0x0, 0x0, &(0x7f00000002c0)={0x77359400}, &(0x7f0000000300), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) keyctl$set_reqkey_keyring(0x7, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) removexattr(&(0x7f0000000540)='./file0\x00', &(0x7f0000000200)=@known='security.SMACK64TRANSMUTE\x00') 03:33:24 executing program 4: userfaultfd(0x0) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) syz_open_dev$usbmon(&(0x7f0000000800)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003d00), 0x0, 0x0, &(0x7f0000003dc0)={0x0, 0x989680}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000008c0)) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000001c0)={0x0, 0x1, 0x6, @random="5bf5ee84fbcf"}, 0x3cf40aefbda97e44) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000380)=@generic) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000300)) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000140)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x0, 0x0) getuid() getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@multicast2, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000004c0)={{{@in=@dev}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f00000005c0)=0xe8) getresgid(&(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) getegid() getgid() getgid() lsetxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000740)=ANY=[], 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={@local, @remote}, &(0x7f00000000c0)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000780)={'veth1\x00'}) 03:33:24 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000040)) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x4200, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) getrusage(0xffffffffffffffff, &(0x7f0000000480)) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000002c0)='hybla\x00', 0x6) bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @multicast1}, 0x10) r3 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(0xffffffffffffffff, 0x40485404, &(0x7f00000003c0)={{0xffffffffffffffff, 0x3, 0x0, 0x0, 0x5}, 0x0, 0x9}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000300)) setrlimit(0x0, &(0x7f0000000200)={0x0, 0xfffffffffffffffa}) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x52, 0x1f, 0x0, 0x1f, 0x6, 0x4, "674916d480de0a9ef7ba3b736d2a55ab134ce5d566f3a94e7a7943090c1705c9319e84185f70978a18599a3fb67ca7825727437e9e11f38e6330deb25868c5eb", "123f29ccec6867a934fc8125cc1c308836303dde5432ef993a580380f6c073e35d2d536bca15503a9962f5340270fc786f2f86206fd2578af950710236e43d8c", "f770caaad9d1f82ff7faa3e4293ee6bf4139b99e9c347e040eefa2787e8d76b6", [0x3, 0x5]}) ioctl$SNDRV_TIMER_IOCTL_START(r2, 0x54a0) ioctl$KDSKBLED(r0, 0x4b65, 0x1) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x4) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0xff6c, 0x4401000000000000, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) ioctl$PPPIOCSMRU(r3, 0x40047452, &(0x7f0000000440)=0x95cf) getpgrp(0xffffffffffffffff) getresuid(&(0x7f0000000380), &(0x7f00000006c0), &(0x7f0000000700)) fstat(r4, &(0x7f0000000740)) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000007c0)) fstat(r2, &(0x7f0000000800)) getpid() getresuid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000ec0), &(0x7f0000000980)=0xffffffffffffffd5) getpid() ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000ac0)) fstat(r4, &(0x7f0000000b00)) lstat(&(0x7f0000000b80)='./file0\x00', &(0x7f0000000bc0)) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f0000000c40)) getgid() sendmmsg$unix(r3, &(0x7f0000001f40)=[{&(0x7f0000000e40)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000001f00)=[{&(0x7f0000000f00)="d54b8ead48301836012432db665f3706785089f32f5455222488f16ff31869e42716d394ffc7d3161af6e90b31965c730274b06133022e968f98aee875ec6da4a67788af2ac26a8b81d57fafb496667b0ba170d38dbf5b8a1c0208489978ac5125cf7aaeb7ad81cf605099c2630bdba440c8e32c2179c0f607a0b885ee988d2dcd3253e59799360ec3a466cbc5147bfb569057eef551cbd744b851b6ad336742c486fbf70acf9c252b8c6699de947a2103b6d913f19e1fc57415e51e782ebb036afa9b994ef494d367385e68d40ca1eb1bacd1129ad799cbd3a33561c288350a0db1ab34b8971e4de4c5c8dfeaa2d620a591388453fdf089e67bdcc4f68acfb490143902d3dfbb26ad258ad3ab7cbbaaa8135c1de8d22b8e299dc03149f28f5cae72703bb11f751393327ebad73ae175154214f1c556e7ad680af2896ac6ea157d1c79a0570d94ef04bfd90e234e6ebeb01164dd9cccb29bc9de3563eaad3877d5b7c6413e4c4eada291aab0b8a07760643d4b3ab5a3530ef9489efea76311e0ac6e3c4ae2dd9f8c304ef02ecabead86e9e99060c271a8e27e25ee6a0b15ade65eaca0353c4e6cce7f0da657ea2788220062ec7de6a018c31aca9c0fa35ba5c69e44775d413e2a608e32e87c0e8fd61a2723d4fefd949c515014afc824b8421c5da923a869eebcf7ac91549ccca306949e9a54bc34652c59c4e1b47267bc51f9803780f2bcf04b6ca116f96ee9efcb5cb7534e6101af8fd180459bf1aa72feca2bef52852f5cfa655113678f47f0465a79efa660f50ef10a210b7bf692f3a764ed3a09c2d10997959603df77e2e08cfb7abe49100a606eebd08e4f284d2062430a3fbead0eb403b3c0fcba9cc222b4b0c75fabf696946e733593009ec921859f7737d14b0188ba6e05e354cf9504d613545ccf6f4c11742f25de37661a376353fd7199ba222dfd2ab8fdd5a2017190b987ce802ef497d888d188553fcf9779adf27b10a42a676f7814b48cff1b7effe58f817098d70134310046b8d7159bbda34d7b086c9733a260f6b7df74dc9fb498adb59818f935c601b0fd4702d034e6ca1b99925f8bd08a58e62b7a9207e1de55b0594b7290dbb6c0818634729ca5f2365753ec9d559583f60adeae70fe4b5d1a77fd02ed5dc928cd08867529187cfb530b25235ef7145cd5cfe9eb659969134cf526bf5dbfc2937e1172c7d502b2941d10b4c01defc5871c115b62faa408ca0b56665ca77f3a432d50802d038f527e6323379a5c150ca702a5b44dd8d8aa979be18b2997a2e8352379f76dbe967f19542fcdfd277ce10078eeffed5bb488f61465624f3586d4c9c708ee61bf5039e965704e10bf7a43457b1a7c380de047f8ddeb3eb5c5487e7669c1b2b234632c5fab53cbcc5376778e6480f1748295c321a68cdddbcbde3f162185e422ea8a8a8613454eebd4666603460e575432295857e62d071678ffa394a522823a1eedaca77d9927b68cb0ba3c44f26a03420172c01a592c51e931f2e7d30bbaa7d2284068bbc39aa56bdc1ac1d45f5d2342cd1e1199ee60e158c4246d21b7835c5221ea63948476187b4d0b2e35940ae0b1c5cd0e4c715f15c1cc7e970861ac4c0c6da3d3f6faa9ec8c0479a09541b71074f4d5acf852c9988f6b0616c80d20abe0cb7f0f84d5eb4efba1397ecb26586e4f9e237b941279de0787eacdd1063d273a7b17cc0053240f5eea898789c3c38a24e104e9b0c41c44a753e9b67a0e1b1a022f65e66f15bc89b64d02ed7b4d158247383a40b408233b1964eaa6b343b8578fbaf8171f172697fef9db69ce1e5a87235c1b430ee2c67cdf6c3feed4ce649724c9a20649613dab41e06f1ca859af82569dec9236fe0abf8d8de4ec3d8bab4118debe150e956298e81dd452de8beb2f8472ddd915715cb29fa1a21c71d2a65ff476b3e92c3280c06d284e7c544c32156434003f13edcfe8a95603cbb0bbc97c7d57b703669f5dfc6b574f75a1e70f1c4a58cabd4af3fc964a562d47a81cb6e128f1ef29b81e76288fa3c8dce6b2f8854449dfcc04ab94480dbd34b88f3eee2e710133408c48d296cecc0f07de2c6938cc4346232367b0cb8f982eb7d80af0c7197660670ce85f785ab3faeb5b2f5cf3f3adc600c8fb3f542b9f83266672bad418c7528e7082054ab7fa656294b330130c18b10c7c81675b1ed2c2a272bd801ad75d4581b35cf285f623b1ba09500771786bc180f2871602f3c056d8dd5b0ce3e583fc98e502cb5e36051c496d2fff2ed6dc0065a2ec712d762834f5d8c2aed5b90ef9f11e645c311905a5e82bc927d9894dcd9a163349f8bf10bcf49ed687500310db7dd93aa45b99649347be1abf0c7eef18d25d92f1472d5d3f23805c8ee2458ac08681e4986872641701a60640f9ae4602881719ffceecb411e9936a0f4ba72fac73507bc40f9518ec694d9a1e9ff33f1080b1eb5e94634d6318688b7875a56f163d1dcd533cd00839c3f8901a65bbef2359bad680eee460c9c3f97bdb3cbf73bc4bd5b3493af5651d4f4dbfe10a733c43e6a0e9600dd2a2c73669d2da6b8e24e4b15fa091c546a85a4c653548a4fcdc46f646cfa199d8e0da2cc9256b09a0dd523196ae11cd50f6add125f3dd531b20c3b0a1093de4c320abcf8d25868fe8cff31f7dc8846f27529203133349d232d55107d3e4e03c9d59f479b78f604ba22b5317fb53df8bd82f2d654d4d59ddeef0a2127ce3fa32e97e51d0d2695bd8ea3d042668bf2ad96501b01daf6b8b13552364d6f7de973809158089d44d65346f612f2ebb98d96df73b306536c580737fa76fc06120646d6699e49c2517179bf7ab43771f0fe8c9ecb2c205ff78a8c2cd702d61301a639d92fd50e1e0af714256ab19dc7731ff1092ad3db076f10120869f3fc1f66afc57f8291dad8d3bee520ca67ccf2f73802ed9e2a9a662d20aa6aed54707190f6c205d745f335756fc611b5d4453dfa548fb4dd3cb365b25195eb667de1a2cd5033c6cd31c1444e0c8f61b6eae3332a753f5de28833f82bd3893a79adb6fa1e424a342eaf505c0944d212f78560564c66ad75f4f14fdcabe00d9b764ac469f1256d24b2f070ac05a313f60ea8888154741303705c7beffd29832b4eaa2a713d9eda10299f788e05d4145214e14823a530fb13daefeab52fb26ee813dfc46610490997db430cf3cbd1683835b2548fb067cfdd2f9e0a3b7e423958b0f7da009115715272cd542628e5bed4d8ef6ae46c983d602aafff6e820a82089593330f57700ebc4a496d11a853da84f3313903cba799170e5936b48abdbe1911d272ebb8d08e37b3dfa1231db48af16c51265d46c4c3d29963857c371bbb8513eb6ff2a5f942d5c1797c4b23761d8d272b2b4cd7610f8a2892269d325ea3b325e544f1d93b42597a55fed115d28c7b78c4b3b1033a96b4b9d365b3a083849fd766f9cd4066042b73a7bdd2236c8a1b6099542f5b0dfa6c9f9002dfe9ead4d5f239b2a91522b0451e3d554e386618001a70a1f6f984914f4949d0bbb2a30741a7256e8671b8fad0a3128b53ab347c91ad555f799419069c8aa197e1d959a0473266ea12bf539667b23cab30d13bd0dd29036e55f34eabc17d74a84adeea1b011b164ed8dde018dec8233d3434d551882b887efc8cfe5f727f509cc979af8bc4fbff375b0a028e02b5482b9825f47d28dd494463da357f5963e43fa8bd99d161f4327437f380adf3a7978190635b412636a1b2e30296f27da9ac70db6b357e8781133a81ec9cd0821c037afa5c177f7e2af2e83c29ec28e07414bc2c01c03d79cfe93644a7d5307dfabd08eb1376a53a741ca4e421d02ad168370d7023c957e089523c218f8ed4b79e60e440ec694c9bb0d57ced1e4470a2dd52258121c19091adc17ac03943b8cfee9995d9f094b60ec7177baaed1f2effc1e2ff3743b8cfe2dc61bf40af013dc98d0b5d9d84fd5faeffcaf83e96d26716c43e1ca85a54571f8743749bf4dd5ed560e602be2ef33c3ff25349f409c8f3f3cea2e85cf693cd6567effe9f4596862ab57c54689ad1e7c187507ee7c2d9dfada0bf8399ea5f4d3e10b749d5895b97e216b80a588e6c7eba416f26d0d030f0c893a70613aaf553d6b979b11a6301534cb716be292f45ba71b8ba27063985b3deeb52b7f5b80a3091409dde911cb823ecc02547d9d08cb1a9daf6368d197ba7d9e180394ff6df0bb925e40f5add64a5ec4ad48220e641467f1ba49f13928f090d59c4fe26af802c7270f5d7562850adfaf8cc234b53be3d095661827dfadff86293544d466d75349d65b0e4cc00f14aa2977fc522a3ddc4307c30910a5ea96dcd699fdb478859c341e8b2640d6147278544198c550e72647180394a7e10961c981f4191b5513634e35550e9bbad0499a7065a06939163256acab76992a84c3310dc5d5e3dc24b291a3861633e4b593191da4bf054c5bb3c66317f1d4d14251d1566cf02e932a96d89c09037f4b0f90fb8fbc0eb3ae8fc7d7f6f38663e08b283c2ad43e037d8bb1ab660e0053108b788792706eaedea35231dea8501b8c68c0187c0ffcdf563b1feb5ec4f3e3a1db77f5f7173209c9b4805326ad8c711e1dfd25f98cbaffd5664c8c79256367bb063112500d4cf5a4e1efe47655931f1424141221fb4e8350b91280cf29cb63a533b4df32fac3f60cd02afa8ba1a95069c3bd2a2e9a4efe8ebfbce5d82b862109933610c3e4dd0b7b0c4e57427659f7251e1f9f4d779aaae16af141242faf983b1d9560b31b51b824a1734fc0ad10bd6dadc046b99f5815a5c514601dc8a081893e605b01c39fad32b11fa18e520a00a00b27ff5cff6f44aa92ccac3b9a61b121a730a8e0b697d31dc7ed96fed0a9441cdb4ecce6be42dd1dea661d56f5dd7abd49eed494ef1bc8b09b07c9206efd7c80ad8552928aa90d54d276343c5246a8b046e7e284fdb585c51d26c401503100e7b1e7003067786cb91ef1eceac1be33a23352c896646f4df3310d67181b95c6ff17441fc77c8ca87547eb04ed533ea4eb9663e0147579ec8b1cd4af3033929dfa5fb053f8358ec364fc8cbc58cc965727b42182d776bd5d63a226ada0211cbf49f9230cac12c647047dd376679fecbc7d2ffdce2b10ab50e5c43b86a83c578e453ba4bf95f8f0b89078ea4aabcef9d1cc8158eabdb5f1825382081c2326d9456b1f1b37f4ff781733cee63e2db492e01512837c41f4c4bf2cd0d9e5afcf4143ba8371b29cfad1ece7811623ec0c6b63146676be3187277bf34f4113c8cc8e08fe807afc996ad2f7ec632daa5037a1e23213c7a3f7528ff6680799d94c2e2718eb02173d4e752c49af5cf6c2ce05d07d1077ad77bd3e1a27fc80f6e8e071259ebfca707c9dd468ecd8a4dc7376196fa552779ed68f362a6a4bc879c9ad3d6fcb0dabafdfef1054cf27ab083274231634787155a76a2a3f5777e550b369e53db57424d91a0e927592c3af2fa0d30388d8c57b0b7419f9086a29f4614acbfbbf00e092411fca7a94fc0af8450ab0749ffcc1f91ad6b959effc89ba7275eb551e639489ac86840cb47f420f67e147a947e2d9a12fde1bd20bf323822628b586acb8fe34b2d1f3db9fa52a1e11fd145f677d604fe424cdeeb3f68d5ad1d6d0fcc9d911d4ac2f5e8a9dcd4108b05edb694d17465fdc7bbf381705a80c05bbfd5a3742ed5a1323a266973a8835b4d474aedf49bf1baaf7f3e54949109df2f4927749ed585e449435001c3712629e4cdebdebe2e7ad9e056bb99c1987e06dfce27496ef53", 0x1000}], 0x1, 0x0, 0x0, 0x4040045}], 0x1, 0x11) 03:33:24 executing program 2: keyctl$set_reqkey_keyring(0xe, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) memfd_create(&(0x7f0000000300)="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", 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in=@dev, @in=@multicast2}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000080)=0xe8) getgid() write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f00000000c0)={0x28}, 0x28) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000004c0), &(0x7f0000000500)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000540), &(0x7f0000000580)=0x8) getpeername$unix(0xffffffffffffffff, &(0x7f0000000280), &(0x7f0000000480)=0x6e) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000480), 0x0) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f00000005c0)) syz_open_dev$adsp(&(0x7f00000007c0)='/dev/adsp#\x00', 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(0xffffffffffffffff, 0xc0305302, &(0x7f0000000600)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000240), &(0x7f00000006c0)=0x8) syz_execute_func(&(0x7f0000000640)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e5e0e075455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") socket$netlink(0x10, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000700)='/dev/sequencer2\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000740), &(0x7f0000000780)=0x8) membarrier(0x0, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000600)) fcntl$getown(0xffffffffffffffff, 0x9) sched_setaffinity(0x0, 0x8, &(0x7f0000000180)) creat(&(0x7f0000000380)='./file0\x00', 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000840), &(0x7f0000000880)=0x497) 03:33:24 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1, 0x7, 0x8, 0x1000000000000008}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f000000b000)={r0, &(0x7f0000014000), &(0x7f0000012000)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000)="95", &(0x7f00000000c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f000000b000)={r0, &(0x7f0000012000), &(0x7f000000cff6), 0x1}, 0x20) 03:33:24 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$KVM_SET_TSC_KHZ(0xffffffffffffffff, 0xaea2, 0x0) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in=@dev, @in=@broadcast}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000000c0)=0xe8) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000007c0)) sched_getattr(0x0, &(0x7f0000000800), 0x30, 0x0) getgid() lstat(&(0x7f0000000080)='./file1\x00', &(0x7f0000000340)) lstat(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400)) getegid() stat(&(0x7f0000000480)='./file1\x00', &(0x7f00000004c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540), &(0x7f0000000580)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) getgroups(0x0, &(0x7f00000007c0)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000840)) lstat(&(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)) getegid() 03:33:24 executing program 3: unshare(0x400) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000000c0)) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000000)) signalfd(r1, &(0x7f0000000040), 0x8) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x1000)=nil, 0x1000, 0xe000, 0x3, &(0x7f0000b18000/0xe000)=nil) 03:33:25 executing program 3: unshare(0x400) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000000c0)) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000000)) signalfd(r1, &(0x7f0000000040), 0x8) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x1000)=nil, 0x1000, 0xe000, 0x3, &(0x7f0000b18000/0xe000)=nil) 03:33:25 executing program 0: keyctl$set_reqkey_keyring(0x3, 0x0) pipe(&(0x7f00000001c0)) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f0000000280)) setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, &(0x7f00000007c0), 0x4) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000780)={0x18}, 0x18) open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000680)) getpgid(0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000640)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) finit_module(0xffffffffffffffff, &(0x7f0000000100)='wlan1{cpuset[vmnet1eth1', 0x0) semget(0xffffffffffffffff, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000700)) 03:33:25 executing program 3: unshare(0x400) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000000c0)) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000000)) signalfd(r1, &(0x7f0000000040), 0x8) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x1000)=nil, 0x1000, 0xe000, 0x3, &(0x7f0000b18000/0xe000)=nil) 03:33:25 executing program 4: setrlimit(0x0, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000580), 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a80)={{{@in=@dev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000080)=0xfffffffffffffda6) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000b80)=ANY=[]) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000640)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000680)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000006c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000700)) getpriority(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") [ 982.613642] cgroup: fork rejected by pids controller in /syz3 03:33:25 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000040)=0x5, 0x4) bind$unix(r1, &(0x7f0000000180)=@file={0x1, './file0\x00'}, 0x6e) connect$unix(r0, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) 03:33:25 executing program 3: unshare(0x400) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000000c0)) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000000)) signalfd(r1, &(0x7f0000000040), 0x8) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x1000)=nil, 0x1000, 0xe000, 0x3, &(0x7f0000b18000/0xe000)=nil) 03:33:25 executing program 5: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x1, 0x7, 0x2000000000b, 0x3}, 0x1fd) 03:33:25 executing program 5: prctl$seccomp(0x1c, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) keyctl$set_reqkey_keyring(0x2, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000700)={0x18}, 0x18) syz_genetlink_get_family_id$ipvs(&(0x7f0000000940)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000900), 0xc, &(0x7f0000000b40)={&(0x7f0000000980)=ANY=[]}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000340)) openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0x0, 0x0) ioctl$SG_SCSI_RESET(0xffffffffffffffff, 0x2284, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, &(0x7f0000000080)={&(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0, 0x0, &(0x7f0000ffd000/0x3000)=nil}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getuid() lstat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000740)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000780)={{{@in=@loopback, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6}}, &(0x7f0000000880)=0xe8) setsockopt$XDP_TX_RING(0xffffffffffffffff, 0x11b, 0x3, &(0x7f0000000200), 0x4) getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:33:25 executing program 2: clock_gettime(0x6, &(0x7f0000000200)) socket$packet(0x11, 0x0, 0x300) shutdown(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000003580), 0x0, 0x0, &(0x7f0000000080)) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() geteuid() stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)) getresuid(&(0x7f00000001c0), &(0x7f00000005c0), &(0x7f0000000600)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000800)=0xc) getresuid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ec0), &(0x7f0000000f00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000f40)={{{@in6=@mcast1, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000001040)=0xe8) getresgid(&(0x7f0000001080), &(0x7f00000010c0), &(0x7f0000001100)) geteuid() getgroups(0x0, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001180)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000001280)=0xe8) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001740)={{{@in=@remote, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000001840)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f00000018c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001900)={{{@in=@broadcast, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000001a00)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) lstat(&(0x7f0000001ac0)='./file0\x00', &(0x7f0000001b00)) getegid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000001e80)={{{@in6=@dev, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000001f80)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001fc0), &(0x7f0000002000)=0xc) getuid() getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002340), &(0x7f0000002380)=0xc) getgroups(0x0, &(0x7f00000023c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000034c0)={{{@in6, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002400)=0x3e4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000035c0), &(0x7f0000003600)=0xc) getresuid(&(0x7f0000003f00), &(0x7f0000003f40), &(0x7f0000003f80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003fc0), &(0x7f0000004000)=0xc) getgid() stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004240), &(0x7f0000004280)=0xc) lstat(&(0x7f00000042c0)='./file0\x00', &(0x7f0000004300)) getgroups(0x0, &(0x7f0000004380)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000043c0)={{{@in=@dev, @in6=@mcast1}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f00000044c0)=0xe8) lstat(&(0x7f0000004500)='./file0\x00', &(0x7f0000004540)) getresuid(&(0x7f00000045c0), &(0x7f0000004600), &(0x7f0000004640)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004680), &(0x7f00000046c0)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:33:25 executing program 1: prctl$intptr(0x2b, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:26 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_INTERRUPT(r2, 0x4004ae86, &(0x7f0000000440)) 03:33:26 executing program 1: futex(&(0x7f0000000040), 0x6, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001680)="42805da0690fef69dc6a6a01eece41ff0f183737c4c19086d9f28fc9410feefa6b2179f3acc4417c10fb410fdd300f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") clock_gettime(0x0, &(0x7f0000000380)) pselect6(0x40, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000440)={&(0x7f0000000400), 0x8}) clock_gettime(0x0, &(0x7f0000000500)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000180)={{{@in=@dev, @in6=@dev}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000280)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000480)) setreuid(0x0, 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) 03:33:26 executing program 3: mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) syz_open_dev$evdev(&(0x7f0000000480)='/dev/input/event#\x00', 0x0, 0x0) pipe(&(0x7f00000004c0)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000500)='/dev/ashmem\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000540)) openat$userio(0xffffffffffffff9c, &(0x7f0000000580)='/dev/userio\x00', 0x0, 0x0) accept4$inet(0xffffffffffffff9c, &(0x7f00000005c0)={0x2, 0x0, @broadcast}, &(0x7f0000000600)=0x10, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000680)={&(0x7f0000000640)='\x00'}, 0x10) syz_open_dev$sndseq(&(0x7f0000000780)='/dev/snd/seq\x00', 0x0, 0x0) getpgrp(0x0) getresuid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) getgroups(0x0, &(0x7f0000000880)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000008c0)) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) fstat(0xffffffffffffffff, &(0x7f00000009c0)) inotify_init() inotify_init1(0x0) syz_open_dev$usbmon(&(0x7f0000000a40)='/dev/usbmon#\x00', 0x0, 0x0) syz_open_dev$adsp(&(0x7f0000000a80)='/dev/adsp#\x00', 0x0, 0x0) openat$userio(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/userio\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000b00)={{{@in=@multicast2, @in=@broadcast}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6}}, &(0x7f0000000c00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000c40)) syz_open_procfs$namespace(0x0, &(0x7f0000000cc0)='ns/pid\x00') openat$autofs(0xffffffffffffff9c, &(0x7f0000000d00)='/dev/autofs\x00', 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000e00)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000e40)='/dev/uhid\x00', 0x0, 0x0) creat(&(0x7f0000000e80)='./file0\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000ec0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000f00)='/dev/vhost-vsock\x00', 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:26 executing program 0: clock_getres(0xfffffffffffffffd, &(0x7f0000000140)) prctl$setmm(0x1b, 0x0, &(0x7f0000ff6000/0x9000)=nil) gettid() openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000140)) getpgrp(0x0) accept$inet(0xffffffffffffff9c, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000002600), 0x0, 0x0, &(0x7f0000000680)={0x0, 0x1c9c380}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:33:26 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r3, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) sendfile(r3, r2, &(0x7f0000000200), 0x3) 03:33:26 executing program 4: clock_gettime(0xb, &(0x7f00000001c0)) perf_event_open(&(0x7f0000c86f88)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/ppp\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000980)=ANY=[], 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f0000000000)) fstat(0xffffffffffffffff, &(0x7f00000028c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000004180)) fstat(0xffffffffffffffff, &(0x7f0000004240)) recvmmsg(0xffffffffffffff9c, &(0x7f0000002bc0), 0x0, 0x0, &(0x7f0000002e00)={0x77359400}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000500)={{}, 'syz0\x00'}) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='system!\x00system\x00'}, 0x10) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000180), 0x10) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000940)=""/17) accept4$unix(0xffffffffffffff9c, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e, 0x0) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000001a80)) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000580)=ANY=[]) syz_execute_func(&(0x7f0000001b00)="42568055a07a7a69ef69dc00d990c866473aee7142c9c937d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e2edfbf7c000000011a011a64ac1e5d31a3b786e2989f7f") accept4(0xffffffffffffffff, &(0x7f0000000240)=@can, &(0x7f00000002c0)=0x80, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="6846bf8f3f49"}, 0x14) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, &(0x7f0000000340)) io_setup(0x0, &(0x7f0000000400)) epoll_create(0x0) io_submit(0x0, 0x0, &(0x7f00000007c0)) 03:33:26 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) migrate_pages(0x0, 0x6, &(0x7f0000000100), &(0x7f0000000140)=0x3) 03:33:26 executing program 2: socket$inet6(0xa, 0x1000000000002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x3, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x2c) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo/4\x00') preadv(r1, &(0x7f0000000700)=[{&(0x7f0000000600)=""/246, 0xf6}], 0x1, 0x0) 03:33:26 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000000)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f000000d000)=@abs={0x1}, 0x2) 03:33:27 executing program 1: clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000040), 0x4) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000180)) syz_execute_func(&(0x7f0000000400)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:27 executing program 2: prctl$setname(0x34, &(0x7f0000000380)='/dev/midi#\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000700)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefac462fd1e28a676e541b87545d745d71ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f2ab7f") 03:33:27 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000000c0)='\'\x00'}, 0x10) ioctl$KVM_S390_VCPU_FAULT(0xffffffffffffffff, 0x4008ae52, &(0x7f0000000240)) mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000cc0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f00000003c0)=""/174, 0xae) finit_module(0xffffffffffffffff, &(0x7f0000000140)="2f70726f632f73656c662f6e65742f70666b65795d663c1f00", 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000540)) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000200), 0x4) rename(&(0x7f0000002180)='./file0\x00', &(0x7f00000029c0)='./file0\x00') syslog(0x0, &(0x7f00000009c0)=""/147, 0x93) socket$unix(0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000040), &(0x7f0000000080)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000001680), &(0x7f0000002cc0)=""/214}, 0x18) timer_delete(0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)) lstat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000a80)) stat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000b80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f0000000c00)=0xc) lstat(&(0x7f0000001140)='./file0\x00', &(0x7f0000001180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0x237) stat(&(0x7f0000001280)='./file0\x00', &(0x7f00000012c0)) lstat(&(0x7f0000001340)='./file0\x00', &(0x7f0000001380)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989f") 03:33:27 executing program 5: keyctl$set_reqkey_keyring(0x5, 0xfffffffd) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x78) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)={{{@in6, @in6}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000300), &(0x7f0000000340)=0x4) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000bc0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f00000000c0)) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f0000000500)=""/42) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000a40)={0x0, @speck128}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000ac0)=0x14) connect$packet(0xffffffffffffffff, &(0x7f0000000b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000480)=""/36) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) keyctl$invalidate(0x15, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000cc0), &(0x7f0000000d00)=0xc) getresgid(&(0x7f0000000d40), &(0x7f00000003c0), &(0x7f0000000dc0)) stat(&(0x7f0000000e00)='./file0\x00', &(0x7f0000000e40)) 03:33:27 executing program 0: semget$private(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f0000000400)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:27 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'team_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000200)={&(0x7f0000000000), 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=@ipv4_newroute={0x30, 0x18, 0x301, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, [@RTA_MULTIPATH={0x14, 0x9, {0x8, 0x0, 0x0, r1}}, @RTA_OIF={0x8}]}, 0x30}}, 0x0) 03:33:27 executing program 4: mount(&(0x7f0000000080)=ANY=[], &(0x7f0000000340)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000000)) mount(&(0x7f0000000480)=ANY=[], &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='rootfs\x00', 0x0, &(0x7f00000005c0)='/selinux/avc/cache_stats\x00') stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e85411, &(0x7f0000000380)=""/132) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x100000058fe4}]}) syz_execute_func(&(0x7f0000000040)="af8055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f382143fd64a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e6989f") 03:33:27 executing program 1: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffff9c, 0x28, &(0x7f00000000c0)}, 0x10) add_key(&(0x7f0000000400)='dns_resolver\x00', &(0x7f0000000440), &(0x7f0000000980), 0x0, 0xfffffffffffffff8) lstat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)) lstat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)) keyctl$chown(0x4, 0x0, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180), 0xc) socket$inet_icmp_raw(0x2, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe7}]}) syz_execute_func(&(0x7f0000000040)="42805da0110fef69dc0fc201e5eeff0faa0faa37c4427d7838c8c19086d9f28fc9664f0f3a61780071c421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafedd7f") 03:33:28 executing program 5: keyctl$set_reqkey_keyring(0x5, 0xfffffffd) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x78) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)={{{@in6, @in6}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000300), &(0x7f0000000340)=0x4) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000bc0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f00000000c0)) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f0000000500)=""/42) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000a40)={0x0, @speck128}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000ac0)=0x14) connect$packet(0xffffffffffffffff, &(0x7f0000000b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000480)=""/36) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) keyctl$invalidate(0x15, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000cc0), &(0x7f0000000d00)=0xc) getresgid(&(0x7f0000000d40), &(0x7f00000003c0), &(0x7f0000000dc0)) stat(&(0x7f0000000e00)='./file0\x00', &(0x7f0000000e40)) 03:33:28 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x100040000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r1, 0xfffffffffffffffd) r2 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_int(r2, 0x29, 0x6, &(0x7f0000000040), 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x1000000004e20}, 0x1c) 03:33:28 executing program 0: io_setup(0x3, &(0x7f0000000040)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000600)={0x0, 0x0, 0x0, 'queue1\x00'}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000001800)='/dev/full\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000001840), 0x4) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") pipe(&(0x7f0000000340)) clock_gettime(0x0, &(0x7f0000000300)) futimesat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380)={{}, {0x0, 0x7530}}) accept4$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000540)=0x14, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000580)={@local}, 0x14) syz_open_pts(0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f00000006c0)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000700)) syz_open_procfs(0x0, &(0x7f0000000740)='net/ip_mr_vif\x00') getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000400)={&(0x7f0000fff000/0x1000)=nil, 0x1000}, &(0x7f0000000440)=0x10) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f0000000180)) socket$inet6(0xa, 0x0, 0x0) close(0xffffffffffffffff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f00000001c0)="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") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) creat(&(0x7f0000000040)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000140)={0x28}, 0x28) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000940)=ANY=[], 0x2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x1da) 03:33:28 executing program 2: prctl$getreaper(0x59616d61, &(0x7f00000002c0)) keyctl$set_reqkey_keyring(0x5, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f970f2d982feefffff7fb32121fbc9") 03:33:28 executing program 4: socket$inet(0x2, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000580)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000040), &(0x7f0000000140)=0xfed2) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000540)=@buf={0x0, &(0x7f0000000380)}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000440)={{}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @broadcast}, 'ip6_vti0\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f00000002c0)={{0x2, 0x0, @dev}, {0x0, @local}, 0x0, {}, 'bridge_slave_1\x00'}) socket$nl_xfrm(0x10, 0x3, 0x6) request_key(&(0x7f0000000500)='pkcs7_test\x00', &(0x7f00000000c0), &(0x7f00000006c0)="41805ae92f756998140e719c", 0xfffffffffffffff8) add_key(&(0x7f00000004c0)='user\x00', &(0x7f0000000680), &(0x7f00000005c0), 0x0, 0x0) add_key(&(0x7f00000001c0)='syzkaller\x00', &(0x7f0000000200), &(0x7f0000000380), 0x0, 0xfffffffffffffff9) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000240)={0x0, @speck128, 0x0, "2c3439d5bc638557"}) keyctl$negate(0xd, 0x0, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f00000005c0)={0x0, {{0x2, 0x0, @remote}}}, 0x88) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01ee0dce41ff0fc4a33d062900370f38211ac4410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b770989f7f") 03:33:28 executing program 5: keyctl$set_reqkey_keyring(0x5, 0xfffffffd) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x78) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)={{{@in6, @in6}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000300), &(0x7f0000000340)=0x4) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000bc0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f00000000c0)) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f0000000500)=""/42) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000a40)={0x0, @speck128}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000ac0)=0x14) connect$packet(0xffffffffffffffff, &(0x7f0000000b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000480)=""/36) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) keyctl$invalidate(0x15, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000cc0), &(0x7f0000000d00)=0xc) getresgid(&(0x7f0000000d40), &(0x7f00000003c0), &(0x7f0000000dc0)) stat(&(0x7f0000000e00)='./file0\x00', &(0x7f0000000e40)) 03:33:29 executing program 3: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") 03:33:29 executing program 1: accept4$unix(0xffffffffffffff9c, &(0x7f0000000140), &(0x7f00000000c0)=0x6e, 0x0) poll(&(0x7f00000001c0), 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) sched_rr_get_interval(0x0, &(0x7f0000000080)) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:33:29 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet(0x2, 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000080)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), 0x269) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000480)=ANY=[], 0x0) socket$inet_udplite(0x2, 0x2, 0x88) sendmsg(0xffffffffffffffff, &(0x7f0000001500)={&(0x7f00000003c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000440), 0x0, &(0x7f0000000480)}, 0x0) syz_emit_ethernet(0x0, &(0x7f00000027c0)=ANY=[], &(0x7f0000000240)) bind$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x64) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000b86000)={0x0, &(0x7f0000f40ff8)}, 0x10) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000340)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000280)) sendto$inet(0xffffffffffffffff, &(0x7f0000a88f88), 0x0, 0x0, &(0x7f0000e68000), 0x10) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140), 0x4) recvmmsg(0xffffffffffffffff, &(0x7f0000001400), 0x0, 0x0, &(0x7f00000014c0)={0x77359400}) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in6, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000b00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b40)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000bc0)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c00)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c80)={{{@in6, @in6=@mcast1}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000d80)=0xe8) getgid() fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000000dc0)) stat(&(0x7f0000000e40)='./file0\x00', &(0x7f0000000e80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000f00)) fstat(0xffffffffffffffff, &(0x7f0000000f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001000)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001040)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001080)={{{@in6=@mcast2, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000001180)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000011c0)) gettid() lstat(&(0x7f0000001240)='./file0\x00', &(0x7f0000001280)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001300), &(0x7f0000001340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001380), &(0x7f00000013c0)=0xc) stat(&(0x7f0000001400)='./file0\x00', &(0x7f0000001440)) getgroups(0x0, &(0x7f0000001540)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003dc0)={{{@in6, @in6}}, {{}, 0x0, @in6=@local}}, &(0x7f0000003ec0)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003f00)) fstat(0xffffffffffffffff, &(0x7f0000003f40)) fstat(0xffffffffffffffff, &(0x7f0000003fc0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000004040)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004080)={{{@in6=@local, @in=@dev}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f0000004180)=0xe8) getresgid(&(0x7f00000041c0), &(0x7f0000004200), &(0x7f0000004240)) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004480)={{{@in6=@local, @in6=@loopback}}, {{@in=@local}}}, &(0x7f0000004580)=0xe8) lstat(&(0x7f00000045c0)='\x00', &(0x7f0000004600)) getpgrp(0x0) lstat(&(0x7f0000004680)='./file0\x00', &(0x7f00000046c0)) getgroups(0x0, &(0x7f0000004740)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000004a40)) fstat(0xffffffffffffffff, &(0x7f0000004a80)) getgid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004b00)) lstat(&(0x7f0000004b40)='./file0\x00', &(0x7f0000004b80)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000004c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c40), &(0x7f0000004c80)=0xc) lstat(&(0x7f0000004cc0)='./file0\x00', &(0x7f0000004d00)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004d80)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004dc0)={{{@in6=@remote, @in6=@mcast1}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000004ec0)=0xe8) getgroups(0x0, &(0x7f0000004f00)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006300), &(0x7f0000006340)=0xc) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000006380)) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 03:33:29 executing program 2: futex(&(0x7f0000000040), 0xc, 0x1, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) futex(&(0x7f0000000280), 0x0, 0x1, &(0x7f00000002c0)={0x77359400}, &(0x7f0000000300), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000180)) syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000200)={'team_slave_0\x00', &(0x7f0000000340)=ANY=[]}) clock_gettime(0x0, &(0x7f0000000440)) open(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000940)) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x0, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f00000005c0)=""/96) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) getsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000080), &(0x7f00000002c0)=0x2) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)) getgid() ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000280)='bpq0\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket(0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000265000), 0x10) socket(0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") clock_nanosleep(0x0, 0x0, &(0x7f0000000240), 0x0) keyctl$set_reqkey_keyring(0x7, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000016c0)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0802403088e9fc421f97087b90000000f7fb3dffbc941") socket$bt_bnep(0x1f, 0x3, 0x4) [ 986.670448] IPVS: ftp: loaded support on port[0] = 21 03:33:29 executing program 5: keyctl$set_reqkey_keyring(0x5, 0xfffffffd) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x78) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)={{{@in6, @in6}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000300), &(0x7f0000000340)=0x4) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000bc0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f00000000c0)) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f0000000500)=""/42) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000a40)={0x0, @speck128}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000ac0)=0x14) connect$packet(0xffffffffffffffff, &(0x7f0000000b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000480)=""/36) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) keyctl$invalidate(0x15, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000cc0), &(0x7f0000000d00)=0xc) getresgid(&(0x7f0000000d40), &(0x7f00000003c0), &(0x7f0000000dc0)) stat(&(0x7f0000000e00)='./file0\x00', &(0x7f0000000e40)) [ 986.918612] audit: type=1326 audit(2000000009.810:69): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=28339 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:33:29 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='veth0_to_bond\x00', 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[@ANYBLOB='#! ./file0 ppp\a\x00\x00\x00oc#vboxnet'], 0x1c) write$binfmt_script(r0, &(0x7f0000000140)={'#! ', './file0', [], 0xa, "bcd254f02e0eadcd42827fe7c1783289f501d43eb9e0ef676ffa6c174e4e6e2a0dab3a24e8fc5a04ad"}, 0x34) 03:33:30 executing program 4: pipe(&(0x7f0000000140)) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180), &(0x7f0000000200)=0x4) clock_getres(0x0, &(0x7f0000000500)) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000440), &(0x7f0000000480)=0x8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @multicast2}}}, &(0x7f00000004c0)=0x84) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0510fef69dc0595c3300dcece3e420ff2c69fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000280)={0x0, @in6={{0xa, 0x0, 0x0, @local}}}, &(0x7f00000003c0)=0x84) setsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000400), 0x8) write(0xffffffffffffffff, &(0x7f00000000c0), 0x0) signalfd4(0xffffffffffffff9c, &(0x7f0000000240), 0x8, 0x0) 03:33:30 executing program 1: ppoll(&(0x7f0000000180), 0x2000014a, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) accept4(0xffffffffffffff9c, &(0x7f00000001c0)=@sco, &(0x7f0000000300)=0x80, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) close(0xffffffffffffffff) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000140)) syz_execute_func(&(0x7f0000000380)="42805da055f7ef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa0f0f2e0c4175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getsockname$packet(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000180)=0x14) 03:33:30 executing program 0: openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 03:33:30 executing program 2: clone(0x4000, &(0x7f0000000540), &(0x7f00000005c0), &(0x7f0000000600), &(0x7f0000000680)) request_key(&(0x7f0000001980)='cifs.idmap\x00', &(0x7f00000002c0), &(0x7f0000001a00)='syz0\x00', 0xfffffffffffffff9) add_key(&(0x7f0000001ac0)='rxrpc_s\x00', &(0x7f0000001b00), &(0x7f0000001b40), 0x0, 0xfffffffffffffffa) keyctl$search(0xa, 0x0, &(0x7f0000001a40)='rxrpc_s\x00', &(0x7f0000001a80), 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000000)) sendmmsg(0xffffffffffffffff, &(0x7f0000000fc0), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001080)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000010c0)={{{@in=@multicast1, @in6}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in6=@remote}}, &(0x7f00000011c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001240)={{{@in, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f0000001340)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000013c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001640)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000001740)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001840)={@multicast1}, &(0x7f0000001880)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000004fc0)={{{@in=@multicast1, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@mcast1}, 0x0, @in=@loopback}}, &(0x7f00000050c0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000005100)={'gre0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000005200), &(0x7f0000005240)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005280)={{{@in=@rand_addr, @in6}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000005380)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000053c0)={@multicast1, @rand_addr}, &(0x7f0000005400)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000007800)={@multicast1, @local}, &(0x7f0000007840)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000007bc0)={@empty, @dev}, &(0x7f0000007c00)=0xc) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000008140)={@mcast2}, &(0x7f0000008180)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000081c0)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000103c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f00000104c0)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000010500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000010540)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f00000122c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000012300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000012480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000124c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000012500), &(0x7f0000012540)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000012580)={0x0, @remote}, &(0x7f00000125c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000012740)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@multicast1}, 0x0, @in6}}, &(0x7f0000012840)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000013180)={&(0x7f0000001040), 0xc, &(0x7f0000013140)={&(0x7f0000012880)={0x14}, 0x14}}, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000740)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000640)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000780)=""/234) syz_execute_func(&(0x7f0000000880)="428055a0726969ef69dc00d99069203737c3397c2a06c443f9603965c4c1d960ee4415406e9e7a9e8f6978e3e7e5e5417545c462010d420036f3e1003ef0f6585501ee31a3b786e2989f3643c144c900eb") 03:33:30 executing program 1: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000289000)={&(0x7f0000000040), 0xc, &(0x7f0000058000)={&(0x7f000023f000)=ANY=[]}}, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000289000)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f000023f000)=ANY=[]}}, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000900)=ANY=[]) prctl$getname(0x10, &(0x7f0000000200)=""/133) semget$private(0x0, 0x0, 0x0) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000940)=ANY=[], 0x0) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:33:30 executing program 2: clone(0x4000, &(0x7f0000000540), &(0x7f00000005c0), &(0x7f0000000600), &(0x7f0000000680)) request_key(&(0x7f0000001980)='cifs.idmap\x00', &(0x7f00000002c0), &(0x7f0000001a00)='syz0\x00', 0xfffffffffffffff9) add_key(&(0x7f0000001ac0)='rxrpc_s\x00', &(0x7f0000001b00), &(0x7f0000001b40), 0x0, 0xfffffffffffffffa) keyctl$search(0xa, 0x0, &(0x7f0000001a40)='rxrpc_s\x00', &(0x7f0000001a80), 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000000)) sendmmsg(0xffffffffffffffff, &(0x7f0000000fc0), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001080)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000010c0)={{{@in=@multicast1, @in6}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in6=@remote}}, &(0x7f00000011c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001240)={{{@in, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f0000001340)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000013c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001640)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000001740)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001840)={@multicast1}, &(0x7f0000001880)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000004fc0)={{{@in=@multicast1, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@mcast1}, 0x0, @in=@loopback}}, &(0x7f00000050c0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000005100)={'gre0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000005200), &(0x7f0000005240)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005280)={{{@in=@rand_addr, @in6}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000005380)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000053c0)={@multicast1, @rand_addr}, &(0x7f0000005400)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000007800)={@multicast1, @local}, &(0x7f0000007840)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000007bc0)={@empty, @dev}, &(0x7f0000007c00)=0xc) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000008140)={@mcast2}, &(0x7f0000008180)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000081c0)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000103c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f00000104c0)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000010500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000010540)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f00000122c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000012300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000012480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000124c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000012500), &(0x7f0000012540)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000012580)={0x0, @remote}, &(0x7f00000125c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000012740)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@multicast1}, 0x0, @in6}}, &(0x7f0000012840)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000013180)={&(0x7f0000001040), 0xc, &(0x7f0000013140)={&(0x7f0000012880)={0x14}, 0x14}}, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000740)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000640)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000780)=""/234) syz_execute_func(&(0x7f0000000880)="428055a0726969ef69dc00d99069203737c3397c2a06c443f9603965c4c1d960ee4415406e9e7a9e8f6978e3e7e5e5417545c462010d420036f3e1003ef0f6585501ee31a3b786e2989f3643c144c900eb") [ 989.713899] device bridge_slave_1 left promiscuous mode [ 989.719488] bridge0: port 2(bridge_slave_1) entered disabled state [ 989.754116] device bridge_slave_0 left promiscuous mode [ 989.759578] bridge0: port 1(bridge_slave_0) entered disabled state [ 991.810122] team0 (unregistering): Port device team_slave_1 removed [ 991.820814] team0 (unregistering): Port device team_slave_0 removed [ 991.830847] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 991.877258] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 991.955109] bond0 (unregistering): Released all slaves [ 992.018363] bridge0: port 1(bridge_slave_0) entered blocking state [ 992.024836] bridge0: port 1(bridge_slave_0) entered disabled state [ 992.031777] device bridge_slave_0 entered promiscuous mode [ 992.064220] bridge0: port 2(bridge_slave_1) entered blocking state [ 992.070625] bridge0: port 2(bridge_slave_1) entered disabled state [ 992.078066] device bridge_slave_1 entered promiscuous mode [ 992.122436] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 992.169004] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 992.309935] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 992.359934] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 992.586286] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 992.595133] team0: Port device team_slave_0 added [ 992.640016] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 992.647552] team0: Port device team_slave_1 added [ 992.694407] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 992.742410] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 992.789958] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 992.797726] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 992.815633] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 992.857614] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 992.865184] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 992.882758] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 993.295497] bridge0: port 2(bridge_slave_1) entered blocking state [ 993.301862] bridge0: port 2(bridge_slave_1) entered forwarding state [ 993.308572] bridge0: port 1(bridge_slave_0) entered blocking state [ 993.314950] bridge0: port 1(bridge_slave_0) entered forwarding state [ 993.322042] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 994.064390] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 994.402089] 8021q: adding VLAN 0 to HW filter on device bond0 [ 994.495925] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 994.585720] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 994.591901] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 994.599654] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 994.688349] 8021q: adding VLAN 0 to HW filter on device team0 03:33:38 executing program 3: socketpair$inet6_tcp(0xa, 0x300, 0x0, &(0x7f00000001c0)) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000740)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000002340), &(0x7f0000002380), &(0x7f00000023c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002780)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002ec0)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() openat$vnet(0xffffffffffffff9c, &(0x7f0000003900)='/dev/vhost-net\x00', 0x2, 0x0) gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) getgroups(0x0, &(0x7f0000004080)) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000004600)=0xe8) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) lstat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getgroups(0x0, &(0x7f00000047c0)) getpid() stat(&(0x7f0000004800)='./file0\x00', &(0x7f0000004840)) stat(&(0x7f00000048c0)='./file0\x00', &(0x7f0000004900)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004980)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000049c0)={{{@in6=@loopback, @in=@dev}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f0000004ac0)=0xe8) getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004b00)) fstat(0xffffffffffffffff, &(0x7f0000004b40)) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000004e80)) fstat(0xffffffffffffffff, &(0x7f0000004ec0)) getgid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004f40), &(0x7f0000004f80)=0xc) getgroups(0x0, &(0x7f0000004fc0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000005000)) lstat(&(0x7f0000005040)='./file0\x00', &(0x7f0000005080)) getegid() fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000005100)='./file0\x00', &(0x7f0000005140)) getegid() getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000051c0)={{{@in6=@dev, @in6=@loopback}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f00000052c0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000005300)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000005340)={{{@in6=@ipv4, @in=@multicast2}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000005440)=0xe8) getresgid(&(0x7f0000005480), &(0x7f00000054c0), &(0x7f0000005500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005540), &(0x7f0000005580)=0xc) fstat(0xffffffffffffffff, &(0x7f00000055c0)) getgid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:38 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f00000000c0)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) getpid() stat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000007c0)) getresuid(&(0x7f0000000800), &(0x7f0000000840), &(0x7f0000000880)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000008c0), &(0x7f0000000900)=0xc) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000940)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000980)='\x00', 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) fstat(0xffffffffffffffff, &(0x7f0000000ac0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000000c00)) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000c80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000b80)='cgroupwlan0\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@remote, @in=@broadcast}}, {{@in=@broadcast}}}, &(0x7f0000000cc0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d00), &(0x7f0000000d40)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) 03:33:38 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000200), 0xc, &(0x7f0000000240)={&(0x7f00000004c0)=@newspdinfo={0x24, 0x24, 0x1, 0x0, 0x0, 0x0, [@ipv6_hthresh={0x8}, @ipv4_hthresh={0x8}]}, 0x24}}, 0x0) 03:33:38 executing program 2: clone(0x4000, &(0x7f0000000540), &(0x7f00000005c0), &(0x7f0000000600), &(0x7f0000000680)) request_key(&(0x7f0000001980)='cifs.idmap\x00', &(0x7f00000002c0), &(0x7f0000001a00)='syz0\x00', 0xfffffffffffffff9) add_key(&(0x7f0000001ac0)='rxrpc_s\x00', &(0x7f0000001b00), &(0x7f0000001b40), 0x0, 0xfffffffffffffffa) keyctl$search(0xa, 0x0, &(0x7f0000001a40)='rxrpc_s\x00', &(0x7f0000001a80), 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000000)) sendmmsg(0xffffffffffffffff, &(0x7f0000000fc0), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001080)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000010c0)={{{@in=@multicast1, @in6}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in6=@remote}}, &(0x7f00000011c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001240)={{{@in, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f0000001340)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000013c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001640)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000001740)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001840)={@multicast1}, &(0x7f0000001880)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000004fc0)={{{@in=@multicast1, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@mcast1}, 0x0, @in=@loopback}}, &(0x7f00000050c0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000005100)={'gre0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000005200), &(0x7f0000005240)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005280)={{{@in=@rand_addr, @in6}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000005380)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000053c0)={@multicast1, @rand_addr}, &(0x7f0000005400)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000007800)={@multicast1, @local}, &(0x7f0000007840)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000007bc0)={@empty, @dev}, &(0x7f0000007c00)=0xc) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000008140)={@mcast2}, &(0x7f0000008180)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000081c0)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000103c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f00000104c0)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000010500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000010540)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f00000122c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000012300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000012480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000124c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000012500), &(0x7f0000012540)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000012580)={0x0, @remote}, &(0x7f00000125c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000012740)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@multicast1}, 0x0, @in6}}, &(0x7f0000012840)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000013180)={&(0x7f0000001040), 0xc, &(0x7f0000013140)={&(0x7f0000012880)={0x14}, 0x14}}, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000740)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000640)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000780)=""/234) syz_execute_func(&(0x7f0000000880)="428055a0726969ef69dc00d99069203737c3397c2a06c443f9603965c4c1d960ee4415406e9e7a9e8f6978e3e7e5e5417545c462010d420036f3e1003ef0f6585501ee31a3b786e2989f3643c144c900eb") 03:33:38 executing program 4: futex(&(0x7f0000000040), 0xa, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) rt_sigtimedwait(&(0x7f0000000200), &(0x7f0000000240), &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f0000000080)) modify_ldt$read_default(0x2, &(0x7f00000009c0)=""/248, 0xce) syz_open_dev$usb(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6=@loopback}}}, &(0x7f0000000800)=0xe8) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000840)={@local, @mcast1, @remote}) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, &(0x7f00000005c0)=""/154) futex(&(0x7f0000000280), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000000c0), 0x0) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(0xffffffffffffffff, 0x641f) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000640)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) rename(&(0x7f0000000500)='./file0\x00', &(0x7f00000004c0)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540), &(0x7f0000000580)=0xc) 03:33:38 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.memory_spread_slab\x00', 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f00000003c0)='cpuset.memory_pressure\x00', 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000140), 0x1) 03:33:39 executing program 0: r0 = syz_open_pts(0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) pwritev(0xffffffffffffffff, &(0x7f0000000300), 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBLED(r0, 0x4b64, &(0x7f0000000380)) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000400), 0xc) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, &(0x7f0000000580)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[], 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = syz_open_dev$dmmidi(&(0x7f0000000500)='/dev/dmmidi#\x00', 0x4a6b, 0x800) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000300)={r1, 0x0, 0x1, 0x9, &(0x7f00000002c0)=[0x0], 0x1}, 0x20) pread64(r2, &(0x7f0000000340)=""/39, 0x27, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x6, 0x1, &(0x7f0000000580), 0x4) sendmsg$nl_route(r3, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r1, r2) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000540)) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f00000003c0)={0x11, 0x81, &(0x7f0000000440)="4b9a344f999a801319fb0aef8bb291676151903aac3d9c70ade9e72e16979ced3c216520403eaef12df521ef6f94a268e4265e4e1d1dc7a9b580f50dd12eeee8a515162674e232dacca63d14c07c0e4409465b9333c9252630bc2e0e9fad60bf7aa7ebf0f024a7e20cbd468412dd1c5a9ecef67a9ad2505863ec285e46cfc74dc7"}) 03:33:39 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000200), 0xc, &(0x7f0000000240)={&(0x7f00000004c0)=@newspdinfo={0x24, 0x24, 0x1, 0x0, 0x0, 0x0, [@ipv6_hthresh={0x8}, @ipv4_hthresh={0x8}]}, 0x24}}, 0x0) 03:33:39 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000200), 0xc, &(0x7f0000000240)={&(0x7f00000004c0)=@newspdinfo={0x24, 0x24, 0x1, 0x0, 0x0, 0x0, [@ipv6_hthresh={0x8}, @ipv4_hthresh={0x8}]}, 0x24}}, 0x0) [ 996.399398] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 996.452398] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 03:33:39 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000200), 0xc, &(0x7f0000000240)={&(0x7f00000004c0)=@newspdinfo={0x24, 0x24, 0x1, 0x0, 0x0, 0x0, [@ipv6_hthresh={0x8}, @ipv4_hthresh={0x8}]}, 0x24}}, 0x0) 03:33:39 executing program 1: keyctl$set_reqkey_keyring(0x7, 0x7) pipe(&(0x7f00000001c0)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@loopback}, &(0x7f00000002c0)=0x14) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000180)) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000000)={0x0, @local, @multicast1}, &(0x7f0000000100)=0xc) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:33:39 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f00000000c0)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) getpid() stat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000007c0)) getresuid(&(0x7f0000000800), &(0x7f0000000840), &(0x7f0000000880)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000008c0), &(0x7f0000000900)=0xc) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000940)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000980)='\x00', 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) fstat(0xffffffffffffffff, &(0x7f0000000ac0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000000c00)) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000c80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000b80)='cgroupwlan0\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@remote, @in=@broadcast}}, {{@in=@broadcast}}}, &(0x7f0000000cc0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d00), &(0x7f0000000d40)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) 03:33:40 executing program 3: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) unshare(0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000012ac0)) syz_open_procfs(0x0, &(0x7f0000000500)='sched\x00') socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f00000106c0)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f00000000c0)) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000002c0)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x0) getitimer(0x0, &(0x7f0000000240)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)=""/195, &(0x7f00000005c0)=0xc3) add_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380), &(0x7f00000003c0), 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@remote, @in=@loopback}}, {{@in=@remote}, 0x0, @in=@broadcast}}, &(0x7f0000000540)=0xe8) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000300), &(0x7f0000000040)=0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 03:33:40 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) lsetxattr$trusted_overlay_redirect(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.redirect\x00', &(0x7f00000001c0)='./file0\x00', 0x8, 0x0) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) 03:33:40 executing program 2: clone(0x4000, &(0x7f0000000540), &(0x7f00000005c0), &(0x7f0000000600), &(0x7f0000000680)) request_key(&(0x7f0000001980)='cifs.idmap\x00', &(0x7f00000002c0), &(0x7f0000001a00)='syz0\x00', 0xfffffffffffffff9) add_key(&(0x7f0000001ac0)='rxrpc_s\x00', &(0x7f0000001b00), &(0x7f0000001b40), 0x0, 0xfffffffffffffffa) keyctl$search(0xa, 0x0, &(0x7f0000001a40)='rxrpc_s\x00', &(0x7f0000001a80), 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000000)) sendmmsg(0xffffffffffffffff, &(0x7f0000000fc0), 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001080)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000010c0)={{{@in=@multicast1, @in6}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in6=@remote}}, &(0x7f00000011c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001240)={{{@in, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f0000001340)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000013c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001640)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000001740)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001840)={@multicast1}, &(0x7f0000001880)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000004fc0)={{{@in=@multicast1, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@mcast1}, 0x0, @in=@loopback}}, &(0x7f00000050c0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000005100)={'gre0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000005200), &(0x7f0000005240)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005280)={{{@in=@rand_addr, @in6}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000005380)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000053c0)={@multicast1, @rand_addr}, &(0x7f0000005400)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000007800)={@multicast1, @local}, &(0x7f0000007840)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000007bc0)={@empty, @dev}, &(0x7f0000007c00)=0xc) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000008140)={@mcast2}, &(0x7f0000008180)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000081c0)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000103c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f00000104c0)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000010500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000010540)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f00000122c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000012300)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000012480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000124c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000012500), &(0x7f0000012540)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000012580)={0x0, @remote}, &(0x7f00000125c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000012740)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@multicast1}, 0x0, @in6}}, &(0x7f0000012840)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000013180)={&(0x7f0000001040), 0xc, &(0x7f0000013140)={&(0x7f0000012880)={0x14}, 0x14}}, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000740)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000640)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000780)=""/234) syz_execute_func(&(0x7f0000000880)="428055a0726969ef69dc00d99069203737c3397c2a06c443f9603965c4c1d960ee4415406e9e7a9e8f6978e3e7e5e5417545c462010d420036f3e1003ef0f6585501ee31a3b786e2989f3643c144c900eb") 03:33:40 executing program 4: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f00000000c0)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) getpid() stat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000007c0)) getresuid(&(0x7f0000000800), &(0x7f0000000840), &(0x7f0000000880)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000008c0), &(0x7f0000000900)=0xc) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000940)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000980)='\x00', 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) fstat(0xffffffffffffffff, &(0x7f0000000ac0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000000c00)) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000c80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000b80)='cgroupwlan0\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@remote, @in=@broadcast}}, {{@in=@broadcast}}}, &(0x7f0000000cc0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d00), &(0x7f0000000d40)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) 03:33:40 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f00000000c0)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) getpid() stat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000007c0)) getresuid(&(0x7f0000000800), &(0x7f0000000840), &(0x7f0000000880)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000008c0), &(0x7f0000000900)=0xc) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000940)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000980)='\x00', 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) fstat(0xffffffffffffffff, &(0x7f0000000ac0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000000c00)) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000c80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000b80)='cgroupwlan0\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@remote, @in=@broadcast}}, {{@in=@broadcast}}}, &(0x7f0000000cc0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d00), &(0x7f0000000d40)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) 03:33:41 executing program 4: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f00000000c0)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) getpid() stat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000007c0)) getresuid(&(0x7f0000000800), &(0x7f0000000840), &(0x7f0000000880)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000008c0), &(0x7f0000000900)=0xc) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000940)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000980)='\x00', 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) fstat(0xffffffffffffffff, &(0x7f0000000ac0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000000c00)) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000c80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000b80)='cgroupwlan0\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@remote, @in=@broadcast}}, {{@in=@broadcast}}}, &(0x7f0000000cc0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d00), &(0x7f0000000d40)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) [ 999.461679] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 03:33:43 executing program 0: r0 = syz_open_pts(0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) pwritev(0xffffffffffffffff, &(0x7f0000000300), 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBLED(r0, 0x4b64, &(0x7f0000000380)) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000400), 0xc) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, &(0x7f0000000580)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[], 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = syz_open_dev$dmmidi(&(0x7f0000000500)='/dev/dmmidi#\x00', 0x4a6b, 0x800) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000300)={r1, 0x0, 0x1, 0x9, &(0x7f00000002c0)=[0x0], 0x1}, 0x20) pread64(r2, &(0x7f0000000340)=""/39, 0x27, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x6, 0x1, &(0x7f0000000580), 0x4) sendmsg$nl_route(r3, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r1, r2) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000540)) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f00000003c0)={0x11, 0x81, &(0x7f0000000440)="4b9a344f999a801319fb0aef8bb291676151903aac3d9c70ade9e72e16979ced3c216520403eaef12df521ef6f94a268e4265e4e1d1dc7a9b580f50dd12eeee8a515162674e232dacca63d14c07c0e4409465b9333c9252630bc2e0e9fad60bf7aa7ebf0f024a7e20cbd468412dd1c5a9ecef67a9ad2505863ec285e46cfc74dc7"}) 03:33:43 executing program 1: mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) pipe2(&(0x7f0000000500), 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000580)) openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x0, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x401870cb, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f0000000180)) ioprio_set$uid(0x0, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000a40)) getgroups(0x0, &(0x7f00000004c0)) getgroups(0x0, &(0x7f0000000800)) lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) getgroups(0x0, &(0x7f0000000b80)) lstat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) lstat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000000cc0)) getegid() getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d40), &(0x7f0000000d80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000dc0), &(0x7f0000000e00)=0xc) setxattr$system_posix_acl(&(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='system.posix_acl_access\x00', &(0x7f0000000e40), 0x24, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@multicast1, @in6=@loopback}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000000240)=0xe8) getresuid(&(0x7f0000000400), &(0x7f00000005c0), &(0x7f0000000600)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xc) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) getresgid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f00000001c0)) stat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)) fstat(0xffffffffffffffff, &(0x7f0000000900)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="42805da00d0fef69dc640f1750000dce0ecf41cb410f38053f260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getpgid(0xffffffffffffffff) syz_execute_func(&(0x7f0000000080)="428055a0ca6969ef69dc00d9036920375137c339392a8e0f38211a7c40a5a5a741dfe0c40265915cc57ee5e54175456426652e3e67a30080ffff1a1a01460f01ee31a3b786e298262e6426f30f2b05090000003f") 03:33:43 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f00000003c0)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x2000000, &(0x7f0000000440)}, &(0x7f0000000180), &(0x7f00000004c0)=""/44, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x60}) 03:33:43 executing program 4: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f00000000c0)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) getpid() stat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000007c0)) getresuid(&(0x7f0000000800), &(0x7f0000000840), &(0x7f0000000880)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000008c0), &(0x7f0000000900)=0xc) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000940)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000980)='\x00', 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) fstat(0xffffffffffffffff, &(0x7f0000000ac0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000000c00)) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000c80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000b80)='cgroupwlan0\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@remote, @in=@broadcast}}, {{@in=@broadcast}}}, &(0x7f0000000cc0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d00), &(0x7f0000000d40)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) 03:33:43 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000bc0), &(0x7f0000000d80)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f00000000c0)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) getpid() stat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000007c0)) getresuid(&(0x7f0000000800), &(0x7f0000000840), &(0x7f0000000880)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000008c0), &(0x7f0000000900)=0xc) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000940)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000980)='\x00', 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) fstat(0xffffffffffffffff, &(0x7f0000000ac0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000000c00)) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000c80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000b80)='cgroupwlan0\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@remote, @in=@broadcast}}, {{@in=@broadcast}}}, &(0x7f0000000cc0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d00), &(0x7f0000000d40)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) 03:33:43 executing program 2: prctl$setname(0x1d, &(0x7f0000000280)='/dev/usbmon#\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$RTC_UIE_OFF(0xffffffffffffffff, 0x7004) semget(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000140)) fstat(0xffffffffffffff9c, &(0x7f00000001c0)) stat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000500)) getegid() openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000840)='/dev/hwrng\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000009c0)={0xffffffffffffffff, 0x0, 0x0, 0xd1, &(0x7f0000000880), &(0x7f00000008c0)=""/209}, 0x28) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000580)) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000300)={{{@in=@dev, @in=@multicast2}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000400)=0x388) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000a40)=ANY=[], 0x0) getgid() pipe2(&(0x7f00000006c0), 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000800), 0x4) write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f00000000c0)={0x28}, 0x28) setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a00), 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b00)="2f70726f632f73315a2f6e65742f697076342f76732f64726f705f7061636b657400034085ec41d4e250992ba5cb1181792bccd34b30b75a843fd8b2dc9d1c717cc0eca3b2724345c0d217e8b80ab8c372726e9e58480c2b81f41bc0002c27d18870f7c36e7cdb7fccb30c10a9d3d84795abd3cd1c3676c4ea82903fec237fedc178ad6f15b6877b55f1df99ae41c42c84b5a95d3a556c08878c86555c5d969aef37e444906a1bb520e06a26b604e8e62ec26d1d86b5ee782f6e", 0x2, 0x0) write$FUSE_STATFS(0xffffffffffffffff, &(0x7f0000000640)={0x60}, 0x60) getpeername$unix(0xffffffffffffffff, &(0x7f0000000280), &(0x7f0000000480)=0x6e) clock_gettime(0x0, &(0x7f0000000080)) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000480), 0x0) 03:33:43 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)=@raw, &(0x7f00000000c0)='GPL\x00', 0x0, 0xd7, &(0x7f0000000140)=""/215}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000300)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000700)="42805da03b6b69ef69dc00d8f3ac69203737c339dc1fbd06b40f38215c215ca564a7660f381dbd170000007a9ec4e215a6fae5e54175458f8858cf0500000081012e660fe095000000003ef0f6585501ee31a3b786e298227992dd28c4e27d183b9f") 03:33:43 executing program 1: getrandom(&(0x7f0000000480)=""/148, 0x1d7, 0x0) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000340), &(0x7f0000000600)) setrlimit(0x0, &(0x7f0000000200)) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000b00)) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18}, 0x18) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) madvise(&(0x7f0000fec000/0x13000)=nil, 0x13000, 0x0) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000080)={'vcan0\x00'}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)) getpgid(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000240)='vcan0\x00'}, 0x30) getpgrp(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000540)={{{@in6, @in6=@ipv4={[], [], @remote}}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000003c0)=0xe8) lstat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) lstat(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)) geteuid() getresuid(&(0x7f0000000840), &(0x7f0000000880), &(0x7f00000008c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000900), &(0x7f0000000940)=0xc) getgroups(0x0, &(0x7f0000000980)) syz_execute_func(&(0x7f0000000400)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") [ 1000.526275] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 03:33:44 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe2(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) write$binfmt_elf64(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x102) getpeername$inet6(r0, &(0x7f0000000400)={0xa, 0x0, 0x0, @local}, &(0x7f0000000440)=0x1c) getsockopt$inet6_udp_int(r2, 0x11, 0x0, &(0x7f0000000380), &(0x7f00000003c0)=0x4) prctl$getname(0x10, &(0x7f0000000800)=""/212) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0xdd, 0x800006, 0x1, 0x6, 0x7f}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x1) sendto$inet(r4, &(0x7f0000000200)="72746c05e523f1d51d442837df71b79c9610003eb24fc7dbcb58a3ae8f557a5e063da17bc85892e0f43785a5025b5332f94be919a9bd4d1b075ccd930b139b93bc", 0x41, 0x4004040, &(0x7f0000000280)={0x2, 0x4e22, @loopback}, 0x10) syz_open_dev$binder(&(0x7f0000000480)='/dev/binder#\x00', 0x0, 0x2) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r4, 0x84, 0x71, &(0x7f00000006c0)={0x0, 0xb1}, &(0x7f0000000700)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000780)={r5, 0x0, &(0x7f0000000740)}, &(0x7f00000007c0)=0x10) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000340)=0x800000001ff, 0x10000038f) r6 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x4000000000006) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r7, &(0x7f0000000040), 0xfe30, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x900000000000000]}}, 0x1c) setsockopt$inet_sctp6_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000900)=@int=0x1fc0000000, 0x4) r8 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rfkill\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f00000004c0)={0x0, 0x4}, &(0x7f0000000500)=0x8) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000540)={r9, 0xa7, 0x5, 0x20, 0x401, 0xff}, 0x14) ioctl$LOOP_SET_CAPACITY(r8, 0x4c07) 03:33:44 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000100)=0x10000000000062) read(r1, &(0x7f0000000080)=""/11, 0xb) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)) ioctl$TCXONC(r1, 0x540a, 0x2) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) 03:33:44 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x2a0000, 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000080), 0x10) write$nbd(0xffffffffffffffff, &(0x7f0000000480)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:33:44 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) 03:33:46 executing program 0: r0 = syz_open_pts(0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) pwritev(0xffffffffffffffff, &(0x7f0000000300), 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBLED(r0, 0x4b64, &(0x7f0000000380)) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000400), 0xc) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, &(0x7f0000000580)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[], 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = syz_open_dev$dmmidi(&(0x7f0000000500)='/dev/dmmidi#\x00', 0x4a6b, 0x800) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000300)={r1, 0x0, 0x1, 0x9, &(0x7f00000002c0)=[0x0], 0x1}, 0x20) pread64(r2, &(0x7f0000000340)=""/39, 0x27, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x6, 0x1, &(0x7f0000000580), 0x4) sendmsg$nl_route(r3, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r1, r2) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000540)) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f00000003c0)={0x11, 0x81, &(0x7f0000000440)="4b9a344f999a801319fb0aef8bb291676151903aac3d9c70ade9e72e16979ced3c216520403eaef12df521ef6f94a268e4265e4e1d1dc7a9b580f50dd12eeee8a515162674e232dacca63d14c07c0e4409465b9333c9252630bc2e0e9fad60bf7aa7ebf0f024a7e20cbd468412dd1c5a9ecef67a9ad2505863ec285e46cfc74dc7"}) 03:33:46 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000140)) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000280)) r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000000)={0x20}, 0x20) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) io_submit(r1, 0x653, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) unshare(0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) getegid() 03:33:46 executing program 4: statfs(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/231) keyctl$set_reqkey_keyring(0x10, 0x0) syz_open_dev$amidi(&(0x7f0000000540)='/dev/amidi#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000580)={0x0, 0x0, 'client0\x00', 0x0, "b61cb578ac9c9d90", "71d2ff45cf70f6777b783b1f2a091ed826c0e41cb2fc6483253b5c91e8a4dd35"}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.current\x00', 0x0, 0x0) ioctl$NBD_SET_TIMEOUT(0xffffffffffffffff, 0xab09, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000380)) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000000400)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', &(0x7f00000003c0)}) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f0000000180)={0x0, 0x0, 0x0, 'queue0\x00'}) syz_execute_func(&(0x7f0000000680)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc7397c2a0f0fcdae300f38211a40a5c441657538c48391683f000f01efe5e57d0fecec1a1a01460f01ee45dfde9f") setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000080), 0x4) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) 03:33:46 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000240)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x4140, &(0x7f00000002c0)) 03:33:46 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000100)=0x10000000000062) read(r1, &(0x7f0000000080)=""/11, 0xb) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)) ioctl$TCXONC(r1, 0x540a, 0x2) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) 03:33:46 executing program 3: iopl(0x0) add_key(&(0x7f0000000340)='dns_resolver\x00', &(0x7f0000000600), &(0x7f0000000640), 0x0, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000300), &(0x7f0000000680), 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) accept$alg(0xffffffffffffff9c, 0x0, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000a00)) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x58fe4}]}) connect$unix(0xffffffffffffffff, &(0x7f0000000940)=@file={0x0, './file0\x00'}, 0x6e) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000280)={'nat\x00'}, &(0x7f0000000580)=0x78) syz_execute_func(&(0x7f00000004c0)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4e19086d90dba8fc9c90feefa4e2179fbe5e565f247af0f2e1ac4010d64ac1e5d31a3b706f08024030866430ff5e04b") ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000200)) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)=""/157, &(0x7f00000000c0)=0x9d) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000009c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f0000000380)='team\x00') getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@hci, &(0x7f0000000440)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000900)={0x0, @multicast1, @broadcast}, &(0x7f0000000b40)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000b80)={@local, @rand_addr}, &(0x7f0000000bc0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000dc0), &(0x7f0000000e00)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f40)={{{@in=@broadcast, @in=@multicast2}}, {{@in=@rand_addr}}}, &(0x7f0000001040)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001080), &(0x7f00000010c0)=0x14) clock_gettime(0x0, &(0x7f0000003840)) recvmmsg(0xffffffffffffffff, &(0x7f00000037c0), 0x0, 0x0, &(0x7f0000003880)) accept$packet(0xffffffffffffffff, &(0x7f00000038c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000003900)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005a80)={0x0, @remote, @multicast2}, &(0x7f0000005ac0)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006dc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000006e00)=0x14, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000006e40)={'bridge_slave_0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007000)={{{@in=@local, @in6=@mcast1}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000007100)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000083c0)={{{@in=@broadcast, @in6=@ipv4={[], [], @rand_addr}}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f00000084c0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008a00)={'bridge_slave_1\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000009d40)={{{@in, @in6=@dev}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000009e40)=0xe8) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f000000a500)={&(0x7f0000000080), 0xc, &(0x7f000000a4c0)={&(0x7f0000009e80)={0x14}, 0x14}}, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000005c0)) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000000840)=ANY=[], 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in6=@mcast1}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000540)=0xe8) unlinkat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000a40)) setitimer(0x0, &(0x7f0000000a80), &(0x7f0000000ac0)) 03:33:46 executing program 2: request_key(&(0x7f0000000040)='pkcs7_test\x00', &(0x7f0000000080), &(0x7f00000000c0)='keyring\x00', 0xffffffffffffffff) add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) request_key(&(0x7f0000000800)='blacklist\x00', &(0x7f0000000840), &(0x7f0000000880)='team0\x00', 0xfffffffffffffffa) keyctl$unlink(0x9, 0x0, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmctl$IPC_STAT(0x0, 0x2, &(0x7f00000001c0)=""/70) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000700)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") [ 1003.488955] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 03:33:46 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000100)=0x10000000000062) read(r1, &(0x7f0000000080)=""/11, 0xb) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)) ioctl$TCXONC(r1, 0x540a, 0x2) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) 03:33:47 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000140)) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000280)) r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000000)={0x20}, 0x20) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) io_submit(r1, 0x653, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) unshare(0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) getegid() 03:33:47 executing program 3: ustat(0x0, &(0x7f0000000140)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) mount(&(0x7f00000006c0)=ANY=[], &(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='devtmpfs\x00', 0x0, &(0x7f00000005c0)='/selinux/avc/cache_stats\x00') getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000540)={'nat\x00', 0x0, 0x0, 0x5c, [], 0x0, &(0x7f00000002c0), &(0x7f0000000400)=""/92}, &(0x7f0000000480)=0x78) fcntl$getflags(0xffffffffffffffff, 0x0) fcntl$getflags(0xffffffffffffffff, 0x0) stat(&(0x7f0000000340)='./file1\x00', &(0x7f0000000740)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) writev(0xffffffffffffffff, &(0x7f0000000400), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") socket$inet(0x10, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000080), &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000280)={0x0, @in6}, 0x84) ioctl$KVM_GET_SUPPORTED_CPUID(0xffffffffffffffff, 0xc008ae05, &(0x7f0000000600)=""/213) recvmmsg(0xffffffffffffffff, &(0x7f0000003ec0), 0x0, 0x0, 0x0) 03:33:47 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x3, 0x0, 0x0, 0x0, 0xfffffffffffff11c}}) 03:33:47 executing program 4: statfs(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/231) keyctl$set_reqkey_keyring(0x10, 0x0) syz_open_dev$amidi(&(0x7f0000000540)='/dev/amidi#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000580)={0x0, 0x0, 'client0\x00', 0x0, "b61cb578ac9c9d90", "71d2ff45cf70f6777b783b1f2a091ed826c0e41cb2fc6483253b5c91e8a4dd35"}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.current\x00', 0x0, 0x0) ioctl$NBD_SET_TIMEOUT(0xffffffffffffffff, 0xab09, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000380)) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000000400)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', &(0x7f00000003c0)}) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f0000000180)={0x0, 0x0, 0x0, 'queue0\x00'}) syz_execute_func(&(0x7f0000000680)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc7397c2a0f0fcdae300f38211a40a5c441657538c48391683f000f01efe5e57d0fecec1a1a01460f01ee45dfde9f") setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000080), 0x4) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) 03:33:49 executing program 0: r0 = syz_open_pts(0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) pwritev(0xffffffffffffffff, &(0x7f0000000300), 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$KDGKBLED(r0, 0x4b64, &(0x7f0000000380)) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000400), 0xc) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, &(0x7f0000000580)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[], 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = syz_open_dev$dmmidi(&(0x7f0000000500)='/dev/dmmidi#\x00', 0x4a6b, 0x800) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000300)={r1, 0x0, 0x1, 0x9, &(0x7f00000002c0)=[0x0], 0x1}, 0x20) pread64(r2, &(0x7f0000000340)=""/39, 0x27, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x6, 0x1, &(0x7f0000000580), 0x4) sendmsg$nl_route(r3, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r1, r2) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000540)) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f00000003c0)={0x11, 0x81, &(0x7f0000000440)="4b9a344f999a801319fb0aef8bb291676151903aac3d9c70ade9e72e16979ced3c216520403eaef12df521ef6f94a268e4265e4e1d1dc7a9b580f50dd12eeee8a515162674e232dacca63d14c07c0e4409465b9333c9252630bc2e0e9fad60bf7aa7ebf0f024a7e20cbd468412dd1c5a9ecef67a9ad2505863ec285e46cfc74dc7"}) 03:33:49 executing program 2: keyctl$set_reqkey_keyring(0x5, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x78) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)={{{@in6, @in6}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000300), &(0x7f0000000340)=0x4) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000bc0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f00000000c0)) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f0000000500)=""/42) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000a40)={0x0, @speck128}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000ac0)=0x14) 03:33:49 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000140)) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000280)) r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000000)={0x20}, 0x20) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) io_submit(r1, 0x653, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) unshare(0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) getegid() 03:33:49 executing program 4: statfs(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/231) keyctl$set_reqkey_keyring(0x10, 0x0) syz_open_dev$amidi(&(0x7f0000000540)='/dev/amidi#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000580)={0x0, 0x0, 'client0\x00', 0x0, "b61cb578ac9c9d90", "71d2ff45cf70f6777b783b1f2a091ed826c0e41cb2fc6483253b5c91e8a4dd35"}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.current\x00', 0x0, 0x0) ioctl$NBD_SET_TIMEOUT(0xffffffffffffffff, 0xab09, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000380)) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000000400)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', &(0x7f00000003c0)}) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f0000000180)={0x0, 0x0, 0x0, 'queue0\x00'}) syz_execute_func(&(0x7f0000000680)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc7397c2a0f0fcdae300f38211a40a5c441657538c48391683f000f01efe5e57d0fecec1a1a01460f01ee45dfde9f") setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000080), 0x4) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) 03:33:49 executing program 3: prctl$setname(0x35, &(0x7f0000000380)='/dev/midi#\x00') signalfd4(0xffffffffffffffff, &(0x7f00000003c0), 0xffffffffffffff7f, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000700)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefac462fd1e28a676e541b87545d745d71ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f2ab7f") 03:33:49 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000100)=0x10000000000062) read(r1, &(0x7f0000000080)=""/11, 0xb) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)) ioctl$TCXONC(r1, 0x540a, 0x2) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) 03:33:49 executing program 5: umount2(&(0x7f0000000400)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f00000001c0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000002bc0), 0x0, 0x0, &(0x7f0000002e00)={0x77359400}) getsockname(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, &(0x7f00000002c0)=0x80) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x4) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000080)={0x10}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000640)) stat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)) fstat(0xffffffffffffffff, &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) getgid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000980)) getuid() getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000009c0)) fstat(0xffffffffffffffff, &(0x7f0000000a00)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) getpgrp(0xffffffffffffffff) getuid() lstat(&(0x7f0000001280)='./file0\x00', &(0x7f00000012c0)) getpid() geteuid() getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001340)) lstat(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001440), &(0x7f0000001480)=0xc) getuid() getresgid(&(0x7f00000014c0), &(0x7f0000001500), &(0x7f0000001540)) getpgid(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001580)={{{@in6=@mcast2, @in=@remote}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f0000001680)=0xe8) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000016c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001700)={{{@in=@broadcast, @in6=@loopback}}, {{@in6=@mcast1}, 0x0, @in=@loopback}}, &(0x7f0000001800)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000001840)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001900)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000018c0)=')\x00'}, 0x30) lstat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a00), &(0x7f0000001a40)=0xc) getpid() getuid() [ 1006.568690] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 03:33:49 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000140)) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000280)) r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000000)={0x20}, 0x20) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) io_submit(r1, 0x653, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) unshare(0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) getegid() 03:33:49 executing program 1: r0 = syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000480)={0x10, 0x0, &(0x7f0000000380)=[@exit_looper, @free_buffer], 0x0, 0x0, &(0x7f00000006c0)}) 03:33:50 executing program 3: keyctl$set_reqkey_keyring(0x10, 0x0) pipe(&(0x7f0000000300)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @loopback}, @in=@multicast1}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f00000001c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000002c0)={0x0, @local, @local}, &(0x7f0000000440)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000580)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'ip6tnl0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000009c0)={{{@in6=@loopback, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000ac0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@loopback, @in=@broadcast}}, {{}, 0x0, @in=@local}}, &(0x7f0000000c80)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000d00)={@mcast2}, &(0x7f0000000e00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000e40)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000e80)={@dev, @dev}, &(0x7f0000000ec0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000f40)={{{@in=@multicast2, @in6}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f0000001040)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001080)={0x0, @dev}, &(0x7f00000010c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001100)={{{@in=@local, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000001200)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001240)={@dev, @local}, &(0x7f0000001280)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000001340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001380)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000013c0)={'sit0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000001480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000014c0)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001500)={{{@in=@dev, @in=@multicast2}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000001600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001640)={@rand_addr, @multicast1}, &(0x7f0000001680)=0xc) getpeername(0xffffffffffffffff, &(0x7f00000016c0)=@hci, &(0x7f0000001740)=0x80) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001840)={@dev, @rand_addr}, &(0x7f0000001880)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000002900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002940)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000029c0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000002a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002a40)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000062c0)={{{@in=@loopback, @in=@rand_addr}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f00000063c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000006580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000065c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000066c0)={@mcast2}, &(0x7f0000006700)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000068c0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006900)={{{@in=@broadcast, @in6=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000006a00)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000006a40), &(0x7f0000006a80)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006ac0)={{{@in, @in=@multicast2}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000006bc0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006c80)={{{@in=@remote, @in6=@mcast2}}, {{@in=@local}, 0x0, @in=@remote}}, &(0x7f0000006d80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000006dc0)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000006e00), &(0x7f0000006e40)=0x14) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:33:50 executing program 4: statfs(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/231) keyctl$set_reqkey_keyring(0x10, 0x0) syz_open_dev$amidi(&(0x7f0000000540)='/dev/amidi#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000580)={0x0, 0x0, 'client0\x00', 0x0, "b61cb578ac9c9d90", "71d2ff45cf70f6777b783b1f2a091ed826c0e41cb2fc6483253b5c91e8a4dd35"}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.current\x00', 0x0, 0x0) ioctl$NBD_SET_TIMEOUT(0xffffffffffffffff, 0xab09, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000380)) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000000400)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', &(0x7f00000003c0)}) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f0000000180)={0x0, 0x0, 0x0, 'queue0\x00'}) syz_execute_func(&(0x7f0000000680)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc7397c2a0f0fcdae300f38211a40a5c441657538c48391683f000f01efe5e57d0fecec1a1a01460f01ee45dfde9f") setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000080), 0x4) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) [ 1007.212388] binder: 28895:28902 BC_FREE_BUFFER u0000000000000000 no match 03:33:50 executing program 2: sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f00000007c0)=[{&(0x7f0000000100)=""/72, 0x48}], 0x1) r0 = syz_open_procfs(0x0, &(0x7f0000000540)='limits\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) creat(&(0x7f00001d3ff4)='./file0/bus\x00', 0x0) [ 1007.945280] binder: 28895:28914 BC_FREE_BUFFER u0000000000000000 no match 03:33:51 executing program 5: futex(&(0x7f0000000380), 0xa, 0x0, &(0x7f0000000280)={0x77359400}, &(0x7f0000000200), 0x200000000004) mincore(&(0x7f0000ff9000/0x2000)=nil, 0x2000, &(0x7f0000000540)=""/165) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f00000001c0), 0x85) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") prctl$seccomp(0x21, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) seccomp(0x0, 0x0, &(0x7f0000000100)) ioperm(0x0, 0x0, 0x0) add_key(&(0x7f0000000a80)='encrypted\x00', &(0x7f0000000ac0), &(0x7f0000000d80), 0x0, 0xfffffffffffffffa) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000940), &(0x7f0000000a40)='*#(-nodev@\x00', 0x0) getresuid(&(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000400)={@loopback}, &(0x7f0000000440)=0x20) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000380)={@local}, &(0x7f0000000580)=0x14) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@local, @in=@rand_addr}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000280)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @local}, &(0x7f00000002c0)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000bc0)) openat$null(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000012c0)={{{@in=@loopback, @in=@broadcast}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000b80)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000c00)={@dev}, &(0x7f0000000c40)=0x14) syz_open_dev$amidi(&(0x7f0000000900)='/dev/amidi#\x00', 0x0, 0x0) 03:33:51 executing program 2: sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f00000007c0)=[{&(0x7f0000000100)=""/72, 0x48}], 0x1) r0 = syz_open_procfs(0x0, &(0x7f0000000540)='limits\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) creat(&(0x7f00001d3ff4)='./file0/bus\x00', 0x0) 03:33:51 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000000140)=ANY=[], 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000180)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) tkill(0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='trusted.overlay.upper\x00', 0xffffffffffffff9c}, 0x10) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) 03:33:51 executing program 4: setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000001c0), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x10, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) 03:33:51 executing program 1: r0 = syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000480)={0x10, 0x0, &(0x7f0000000380)=[@exit_looper, @free_buffer], 0x0, 0x0, &(0x7f00000006c0)}) 03:33:51 executing program 0: dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$KVM_GET_MP_STATE(0xffffffffffffffff, 0x8004ae98, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe8}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") [ 1008.854110] binder: 28922:28923 BC_FREE_BUFFER u0000000000000000 no match 03:33:51 executing program 1: r0 = syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000480)={0x10, 0x0, &(0x7f0000000380)=[@exit_looper, @free_buffer], 0x0, 0x0, &(0x7f00000006c0)}) 03:33:51 executing program 4: setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000001c0), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x10, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) [ 1009.153201] binder: 28938:28939 BC_FREE_BUFFER u0000000000000000 no match 03:33:52 executing program 2: sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f00000007c0)=[{&(0x7f0000000100)=""/72, 0x48}], 0x1) r0 = syz_open_procfs(0x0, &(0x7f0000000540)='limits\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) creat(&(0x7f00001d3ff4)='./file0/bus\x00', 0x0) 03:33:52 executing program 1: r0 = syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000480)={0x10, 0x0, &(0x7f0000000380)=[@exit_looper, @free_buffer], 0x0, 0x0, &(0x7f00000006c0)}) 03:33:52 executing program 4: setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000001c0), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x10, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) [ 1009.551838] binder: 28949:28951 BC_FREE_BUFFER u0000000000000000 no match 03:33:52 executing program 1: socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), &(0x7f0000000240)=0x10) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x18}, 0x18) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:52 executing program 4: setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000001c0), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x10, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) 03:33:52 executing program 5: syz_open_dev$vcsn(&(0x7f0000000240)='/dev/vcs#\x00', 0x0, 0x20040) seccomp(0x0, 0x0, &(0x7f0000000580)={0x0, &(0x7f0000000400)}) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[]}}, 0x0) gettid() socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000200), 0x4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ppoll(&(0x7f0000000080), 0x97, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000040), 0x8) syz_open_procfs(0x0, &(0x7f00000005c0)="6e65742f69709896365f7461c6be65735f746172676574730042f6e828483d54650a4d428c056eb496a83e0b7c843aec422aad51e6b92c69fba7a691b82b632b3f383391e9989a982aa6a28bf379cb438854e74249583a025fac42a8781fe40c6d15e909040942cacd4980b8656ea777cfeb52d0dda06f83785af2f63347830f34b318d72031370797bb2e96c22ef8d57a64a739f2223fc06389bee6") getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000006c0), &(0x7f0000000700)=0x20) setsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000740), 0x8) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000340), 0x1) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, &(0x7f0000000300)) userfaultfd(0x0) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f00000000c0)={0x18}, 0x18) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000380)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000440)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f00000004c0)) creat(&(0x7f0000000540)='./file0\x00', 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000840)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000008c0)={{{@in=@remote, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000009c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000a00)={'team0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f00000032c0), 0x0, 0x0, &(0x7f0000003380)={0x0, 0x1c9c380}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003540)={'syz_tun\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000035c0)={'team0\x00'}) syz_execute_func(&(0x7f0000000280)="42805da0690fef69dc4f702183ce41ff0f183737c421716022c4c19086d9f28fc9410feefa6b2179a6e5e54175450f6e1ac4010d64ac1e5d31a3b7400faeece0e29898983640d037") 03:33:52 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000100)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe000000008500000020000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xe, 0xd7, &(0x7f0000000080)="3c08000000800000637c380324dd", &(0x7f0000000480)=""/215, 0x8000}, 0x28) 03:33:52 executing program 0: signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) pwritev(0xffffffffffffffff, &(0x7f00000007c0), 0x0, 0x0) mlock2(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='-$\x00', 0xffffffffffffff9c}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:33:52 executing program 2: sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f00000007c0)=[{&(0x7f0000000100)=""/72, 0x48}], 0x1) r0 = syz_open_procfs(0x0, &(0x7f0000000540)='limits\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) creat(&(0x7f00001d3ff4)='./file0/bus\x00', 0x0) 03:33:53 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f0000000200)=@deltfilter={0x24, 0x2d, 0x101, 0x0, 0x0, {0x0, 0x0, {}, {}, {0x0, 0xfff3}}}, 0x24}}, 0x0) 03:33:53 executing program 3: clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) lsetxattr$trusted_overlay_opaque(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.opaque\x00', &(0x7f0000000140)='y\x00', 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") accept4$unix(0xffffffffffffffff, &(0x7f0000000200)=@abs, &(0x7f0000000280)=0x6e, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000540)={{{@in6=@mcast2, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f0000000480)=0xe8) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) r0 = dup(0xffffffffffffff9c) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000040)) getpgrp(0x0) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000700)={{{@in6=@mcast1, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getresgid(&(0x7f0000000840), &(0x7f0000000880), &(0x7f00000008c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', r0}, 0x10) gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000900)={{{@in, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000000a00)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) getresgid(&(0x7f0000000b80), &(0x7f0000000bc0), &(0x7f0000000c00)) 03:33:53 executing program 2: setpriority(0x0, 0x0, 0x0) open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_all\x00', 0x0, 0x0) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, &(0x7f0000000300)) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000240), &(0x7f00000003c0)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:33:53 executing program 4: clock_getres(0x19bbfd0afe09e2a, &(0x7f00000001c0)) ustat(0x0, &(0x7f0000000140)) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000000c0), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") clock_gettime(0x0, &(0x7f0000000080)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:33:53 executing program 4: clock_gettime(0x4, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da00fef69dc0f01ee263a2086d40000c041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") socket$inet(0x2, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000deb000)={0x2, 0x0, @multicast1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='vmnet0securityvboxnet0*vmnet0\\\'cpuseteth0\x00'}, 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000400)={&(0x7f0000000340)='./file1\x00'}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000a88f88), 0x29f, 0x0, &(0x7f0000e68000)={0x2, 0x0, @loopback}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x10) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000440)) close(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) lstat(&(0x7f0000001ac0)='./file1\x00', &(0x7f0000001b00)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001b80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001bc0)={{{@in=@multicast1, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f0000001cc0)=0xe8) getegid() gettid() lstat(&(0x7f0000001d00)='./file0\x00', &(0x7f0000001d40)) getresgid(&(0x7f0000001dc0), &(0x7f0000001e00), &(0x7f0000001e40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002200), &(0x7f0000002240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000002280)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002300), &(0x7f0000002340)=0xc) getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002380)={{{@in=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@local}}, &(0x7f0000002480)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000024c0), &(0x7f0000002500)=0xc) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004ac0), &(0x7f0000004b00)=0xc) fstat(0xffffffffffffffff, &(0x7f0000004b40)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004bc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c00)={{{@in6=@remote, @in=@dev}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004fc0)=0xe8) lstat(&(0x7f0000004d40)='./file0\x00', &(0x7f0000004d80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004f00), 0x0, 0x0) getxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='system.posix_acl_access\x00', &(0x7f0000000140)=""/191, 0xbf) openat$rfkill(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rfkill\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f0000000300)) openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0xc) lstat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)) 03:33:53 executing program 1: keyctl$set_reqkey_keyring(0x4, 0xfffffffe) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0), &(0x7f0000000200), 0x0, 0xfffffffffffffffb) keyctl$update(0x2, 0x0, &(0x7f00000002c0), 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000400)) getegid() setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000040)) getpgrp(0x0) prctl$getname(0x10, &(0x7f0000000200)=""/103) getpgrp(0x0) add_key$keyring(&(0x7f0000000640)='keyring\x00', &(0x7f0000000680), 0x0, 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000580)='asymmetric\x00', &(0x7f00000005c0), &(0x7f0000000600), 0x0, 0x0) getpgrp(0x0) 03:33:53 executing program 5: ioprio_set$uid(0x0, 0x0, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000680)='/dev/urandom\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000840)) pipe(&(0x7f0000000780)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000c80)='/dev/rtc0\x00', 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000dc0)='syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000300)='cgroup.subtree_control\x00', 0x2, 0x0) accept4$inet(0xffffffffffffff9c, &(0x7f0000000a00)={0x2, 0x0, @remote}, &(0x7f0000000a40)=0x10, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000980)) lchown(&(0x7f00000007c0)='./file0\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0), 0x0, 0x0, 0xfffffffffffffffc) syz_emit_ethernet(0x0, &(0x7f0000000400)=ANY=[], &(0x7f0000000080)) syz_emit_ethernet(0x0, &(0x7f0000000440)=ANY=[], &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f0000000800)={0x0, &(0x7f00000007c0)}) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000180)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='%*posix_acl_access\x00'}, 0x10) setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000740), 0x0) dup(0xffffffffffffffff) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f00000004c0)) add_key(&(0x7f00000001c0)="6361b6a32e69646d617000", &(0x7f0000002f40), &(0x7f0000002f00), 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b40)={{{@in=@multicast1, @in=@remote}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000640)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'bpq0\x00'}) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f0000000700)) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000240)={@local, @dev, @loopback}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getgroups(0x0, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000500)={{{@in, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000600)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000a80)={0x8c, 0x7d, 0x0, {{0x0, 0x6c, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x13, '%*posix_acl_access\x00', 0x8, 'keyring\x00', 0x9, "73656c696e75782efd", 0x15, 'QH:cgroupmime_typeem1'}, 0xb, "6361b6a32e69646d617000"}}, 0x8c) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:33:53 executing program 0: semget(0xffffffffffffffff, 0x0, 0x0) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f00000000c0)=""/5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffff9c, 0x0, 0x20, &(0x7f0000000040)='eth1trustedppp0vboxnet1vboxnet0\x00'}, 0x30) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x0, 0x0) geteuid() write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000000240)={0xe, 0x7, 0x0, {0x5, 'wlan0'}}, 0xe) getgid() ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5335, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00'}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") memfd_create(&(0x7f0000c19ff0)='trustedvboxnet0\x00', 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 03:33:54 executing program 3: eventfd2(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x100000058fe4}]}) syz_execute_func(&(0x7f0000000380)="af8055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f382143fd64a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e6989f") lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f0000000080)='y\x00', 0x2, 0x0) socket$unix(0x1, 0x0, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000100), &(0x7f0000000180)=0xc) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000280), &(0x7f00000002c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000440)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000480)={@multicast1, @multicast2}, &(0x7f00000004c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@dev, @in=@multicast2}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f0000000600)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f0000000640), &(0x7f0000000680)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000780)={{{@in=@dev, @in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f0000000880)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000980)={0x0, @broadcast, @remote}, &(0x7f00000009c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001e80)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001f80)={@multicast1}, &(0x7f0000001fc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002000)={{{@in6=@ipv4={[], [], @loopback}, @in=@local}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000002100)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000002140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002180)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000021c0)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in6=@remote}, 0x0, @in=@multicast1}}, &(0x7f00000022c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002300)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in=@dev}}}, &(0x7f0000002400)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000002440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002480)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000003700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000003740)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003780)={0x0, @empty, @remote}, &(0x7f00000037c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003800)={'team0\x00'}) getpeername(0xffffffffffffffff, &(0x7f0000003840)=@can, &(0x7f00000038c0)=0x80) getpeername$packet(0xffffffffffffff9c, &(0x7f0000003940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000003980)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000039c0)={{{@in, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000003ac0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000003b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000003b40)=0x14) accept4(0xffffffffffffffff, &(0x7f0000006380)=@xdp, &(0x7f0000006400)=0x80, 0x0) 03:33:54 executing program 2: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x89e1, &(0x7f0000000000)={"6272696467653000000100"}) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(0xffffffffffffffff, 0x8008ae9d, &(0x7f0000000080)=""/101) 03:33:54 executing program 2: syz_mount_image$gfs2(&(0x7f00000006c0)='gfs2\x00', &(0x7f0000000700)='./file0\x00', 0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f00000007c0)={[{@upgrade='upgrade'}]}) [ 1011.450448] gfs2: not a GFS2 filesystem 03:33:54 executing program 4: shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000440)) syz_open_procfs(0x0, &(0x7f0000000080)='net/tcp6\x00') getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), &(0x7f0000000140)=0x4) prlimit64(0x0, 0x0, &(0x7f0000000480), &(0x7f00000004c0)) recvmmsg(0xffffffffffffffff, &(0x7f00000060c0), 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f00000062c0), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0690fef69dc0f01ee0dce41ff0fc4a33d062900370f38211ac4410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") [ 1011.550086] gfs2: not a GFS2 filesystem 03:33:54 executing program 1: pselect6(0x40, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600), &(0x7f0000000640), &(0x7f00000006c0)={&(0x7f0000000680), 0x8}) seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:33:54 executing program 2: accept(0xffffffffffffffff, &(0x7f0000000f40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001600)=0x80) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001640)={@local}, &(0x7f0000001680)=0x14) set_tid_address(&(0x7f0000000200)) mq_open(&(0x7f0000000000)=':\x00', 0x0, 0x0, &(0x7f00000000c0)) getrlimit(0x0, &(0x7f00000002c0)) mq_open(&(0x7f00000001c0)='vmnet1trusted\x00', 0x0, 0x0, &(0x7f0000000240)) write(0xffffffffffffffff, &(0x7f0000000240), 0x0) set_robust_list(&(0x7f0000000180)={&(0x7f0000000140)={&(0x7f0000000100)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000300), 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') accept4$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000004c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)={@dev}, &(0x7f0000000540)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@remote, @in=@local}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000680)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000700)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000740)={'veth1_to_team\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@local}}, {{@in=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000880)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000008c0)={{{@in, @in6=@mcast1}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f00000009c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a00)={{{@in=@local, @in=@local}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000b00)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000b80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000c00)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000c40)={{{@in6, @in=@loopback}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f0000000d40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000dc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000e00)={{{@in=@dev, @in=@loopback}}, {{}, 0x0, @in=@loopback}}, &(0x7f0000000f00)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001000)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f0000000280), 0xc, &(0x7f0000001580)={&(0x7f0000001040)={0x14}, 0x14}}, 0x0) syz_execute_func(&(0x7f0000000380)="408055a05f6969ef69dc00d9c421a05d2f8a20f2420f58410d8f6840cf880e00000001cdaeab3138211a40a5c441657538c48391683f000f01efe5e57d0f66f3f081900c0000007400653666400f55aa07000000e59a01460f01ee45ffde9f") 03:33:54 executing program 0: semget(0xffffffffffffffff, 0x0, 0x0) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f00000000c0)=""/5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffff9c, 0x0, 0x20, &(0x7f0000000040)='eth1trustedppp0vboxnet1vboxnet0\x00'}, 0x30) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x0, 0x0) geteuid() write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000000240)={0xe, 0x7, 0x0, {0x5, 'wlan0'}}, 0xe) getgid() ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5335, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00'}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") memfd_create(&(0x7f0000c19ff0)='trustedvboxnet0\x00', 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 03:33:54 executing program 5: clock_getres(0x0, &(0x7f0000000400)) eventfd(0x0) fchdir(0xffffffffffffffff) dup(0xffffffffffffffff) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b80)={@loopback}, &(0x7f0000000bc0)=0x14) fstat(0xffffffffffffffff, &(0x7f0000000340)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000040), 0x4) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000440)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000480)={{{@in=@dev, @in6=@loopback}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000580)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") seccomp(0x0, 0x0, &(0x7f0000000100)) 03:33:54 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)="636c6561725f72656673000e26f4219411c8d7870771d49f76") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='schedstat\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, &(0x7f0000000700), 0x1) eventfd2(0x0, 0x0) 03:33:55 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)="636c6561725f72656673000e26f4219411c8d7870771d49f76") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='schedstat\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, &(0x7f0000000700), 0x1) eventfd2(0x0, 0x0) 03:33:55 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)="636c6561725f72656673000e26f4219411c8d7870771d49f76") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='schedstat\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, &(0x7f0000000700), 0x1) eventfd2(0x0, 0x0) 03:33:55 executing program 4: request_key(&(0x7f0000000400)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000040)="7f7070703173656c6600", 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000700)) mmap(&(0x7f0000bff000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000006c0)) inotify_init1(0x0) prctl$void(0x0) openat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0x50, &(0x7f0000000380)}, 0x10) getresgid(&(0x7f0000000140), &(0x7f00000001c0), &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) creat(&(0x7f0000000240)='./file0\x00', 0x0) prctl$setmm(0x23, 0x0, &(0x7f0000db2000/0x3000)=nil) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") clock_gettime(0x0, &(0x7f00000002c0)) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000500)={@in6={{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x0, 0x0, "68eaec35ebd92188039926a3d47fd4831148cdb086e9c73aa740028cf7f0ee0e6689bd6e88666a24950f4e013ea219d6361c4cc1b8f3abfc2c46b095211878bb12a8a16e998773eb7bba544dc2ddfed4"}, 0xd8) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:33:55 executing program 1: keyctl$set_reqkey_keyring(0x7, 0xffffffffffffffff) futex(&(0x7f0000000ac0), 0x0, 0x2, &(0x7f0000000200)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) pipe2(&(0x7f0000000040), 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f0000000080), &(0x7f0000000180)=0x4) keyctl$set_reqkey_keyring(0x7, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") 03:33:55 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)="636c6561725f72656673000e26f4219411c8d7870771d49f76") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='schedstat\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, &(0x7f0000000700), 0x1) eventfd2(0x0, 0x0) 03:33:55 executing program 4: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000018c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001900)={{{@in=@remote, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001a00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000001a40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000002b00)="5b2d70726f637d656d31b800"}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002b80)={{{@in, @in=@local}}, {{@in=@rand_addr}, 0x0, @in6=@remote}}, &(0x7f0000002c80)=0xe8) getegid() ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000002cc0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000002d00)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000003000)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003040), &(0x7f0000003080)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000004440)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004480)={{{@in6, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000004580)=0xe8) getgid() getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000045c0)={{{@in6=@dev, @in6=@local}}, {{}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000046c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000280)) getpid() getresuid(&(0x7f0000004780), &(0x7f00000047c0), &(0x7f0000004800)) getegid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004840), &(0x7f0000004880)=0xc) lstat(&(0x7f00000048c0)='./file0\x00', &(0x7f0000004900)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004980)) geteuid() getgroups(0x0, &(0x7f00000049c0)) getpid() lstat(&(0x7f0000006180)='./file0\x00', &(0x7f00000061c0)) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) syz_execute_func(&(0x7f0000000200)="1c8e805da0616969692295d3200f01ee5a41ff0f1837370f38211ac4c4c3996b6205d8c81ceefa6be27973e5e54175450f2e1ac4010d64ac1e5d31a3b755b498985fc3") 03:33:55 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x100000000805, 0x0) listen(r0, 0x800006) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00007dc000)=0x1, 0x4) 03:33:55 executing program 0: semget(0xffffffffffffffff, 0x0, 0x0) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f00000000c0)=""/5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffff9c, 0x0, 0x20, &(0x7f0000000040)='eth1trustedppp0vboxnet1vboxnet0\x00'}, 0x30) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x0, 0x0) geteuid() write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000000240)={0xe, 0x7, 0x0, {0x5, 'wlan0'}}, 0xe) getgid() ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5335, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00'}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") memfd_create(&(0x7f0000c19ff0)='trustedvboxnet0\x00', 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 03:33:55 executing program 2: ustat(0x6, &(0x7f0000001200)) clock_gettime(0x0, &(0x7f0000000040)) dup(0xffffffffffffffff) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:33:55 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) mremap(&(0x7f0000009000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000008000/0x1000)=nil) remap_file_pages(&(0x7f0000007000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) 03:33:56 executing program 3: clock_gettime(0x0, &(0x7f00000001c0)) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f0000000640), &(0x7f0000000580), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x0, 0x0, "3cb9deda5a648da5ab98b79314ee36da1780e314fbeef4644d9a2365edbc048a8191a584cb79d55947968869bb0fabd6cd21b01637e5de52c14bb4371167c08ba6a112c902c871ff126146004ebfc750"}, 0xd8) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) lstat(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000380)) fstat(0xffffffffffffffff, &(0x7f0000000480)) fstat(0xffffffffffffffff, &(0x7f0000000500)) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) setgroups(0x0, &(0x7f00000005c0)) creat(&(0x7f0000000340)='./file1\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:33:56 executing program 5: prctl$setname(0xf, &(0x7f0000000440)='\b\x00\x00\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getpid() geteuid() lstat(&(0x7f0000000400)='./file1\x00', &(0x7f0000000500)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000580)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in=@broadcast, @in=@remote}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000ac0)) geteuid() getgroups(0x0, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c40), &(0x7f0000000c80)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getresuid(&(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80)) stat(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000e00)) gettid() fstat(0xffffffffffffffff, &(0x7f0000000e80)) stat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000fc0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001000)) getpgrp(0x0) getuid() stat(&(0x7f0000001080)='./file0\x00', &(0x7f00000010c0)) getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002340)={{{@in=@dev, @in6=@local}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000002440)=0xe8) getresgid(&(0x7f0000000080), &(0x7f00000024c0), &(0x7f00000000c0)) fcntl$getown(0xffffffffffffffff, 0x9) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002540), &(0x7f0000002580)=0xc) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000025c0), &(0x7f0000002600)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002ac0), &(0x7f0000002b00)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da0aa878769ef69dc00d9ce200441ffff1833c423fbf07b030d0f38211ac4c19086fbd9f28f6744adc90feefa4e2179fb237532c6c62e6736660f2d83000000000d64ac1e5da358b706b79866f046fe4ee57f") 03:33:56 executing program 1: add_key(&(0x7f0000000580)='pkcs7_test\x00', &(0x7f00000005c0), &(0x7f0000000640), 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000a80)='trusted\x00', &(0x7f0000000780), &(0x7f00000009c0), 0x0, 0xfffffffffffffff9) request_key(&(0x7f0000000380)='cifs.spnego\x00', &(0x7f00000003c0), &(0x7f0000000600)="5e6d643573756db100", 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000004c0), 0x4) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000004180)=ANY=[], 0x0, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000180), 0x4) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000740)) getpgid(0xffffffffffffffff) getpid() clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) keyctl$invalidate(0x15, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=""/116, &(0x7f0000000280)=0x74) getpid() syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip6_mr_cache\x00') seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x100000058fe4}]}) syz_execute_func(&(0x7f0000000380)="af8055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f43fd64a741dfe0400f01efe5e57d0fecec1a01460f01ee31a3b786e6989f") 03:33:56 executing program 4: eventfd(0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0xfffffffffffffd57) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000040), &(0x7f0000002380), &(0x7f00000023c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002780)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002ec0)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:56 executing program 0: semget(0xffffffffffffffff, 0x0, 0x0) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f00000000c0)=""/5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffff9c, 0x0, 0x20, &(0x7f0000000040)='eth1trustedppp0vboxnet1vboxnet0\x00'}, 0x30) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x0, 0x0) geteuid() write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000000240)={0xe, 0x7, 0x0, {0x5, 'wlan0'}}, 0xe) getgid() ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5335, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00'}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") memfd_create(&(0x7f0000c19ff0)='trustedvboxnet0\x00', 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 03:33:56 executing program 2: inotify_init() seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x100000058fe4}]}) syz_execute_func(&(0x7f0000000380)="af8055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f382143fd64a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e6989f") 03:33:56 executing program 3: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000280)={0xffffffffffffffff}) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000380)=ANY=[], &(0x7f0000000540)) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af04, &(0x7f00000003c0)=&(0x7f00000002c0)) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x3, 0x4, 0x0, 0x0, 0x0, 0x0, 0x2004, 0x6, 0x0, 0x5b3, 0x7, 0x0, 0x1, 0x6, 0x80000001, 0x1, 0x7fff, 0x3, 0x6, 0x0, 0x200, 0x20, 0x8, 0x0, 0x9, 0x0, 0x0, 0x10001, 0x8, 0x0, 0x0, 0x5, 0xb, 0x3, 0x1, 0x9, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000480), 0xd}, 0x2, 0x8001, 0x10000, 0x4, 0x1ff, 0x5}, 0x0, 0xc, r0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000400)}}, 0x20) write$UHID_INPUT(r2, &(0x7f0000000980)={0x8, "7c70ee3800d5ab5f2036f872e0ac57cbd592bca0d671633f50a3102066d6e765f5a64731e3fb8d90d250eda2cc33b60a7ff98074cdc3f1dd1a2df26a381d95974e0925d521c6b48c3dee0d430d398884316091aff6adb6153dc3c92549957d3488efc02d6f6fb172524b095c30c1bd35aae04236bdd42694d613eb54c0b65a338c48dc4c8bad70754fc81d9928e4a1b81f9c77075258a0805b4494867247966b24a023311fd91ef3754b98d3acde6f2ef0617f123c22fccb81c11389fdfa2e21c2365aabfc8916e02151d8643ae21cab7fcbec6142186d3bb57546c106484bc4c28a48da2b75dd82aabe99464558e60cd101f6b65856fabee614d271741a68dd550c8772f06a93cf8e5c0de549c3b75a72f8a590bd50b2af5f64009c969ed7596f0192b0f98b1afac0e8c5f4c653f611b4a71776400a9ae3f18e75f856788c97195749042510735880b9bb0ccb23210832a4f1c6f134d68f8e299837c426e0c9a45d5d2c959446cc363f370c67cd01a063c91254d692fe35abee92fabda4f66d93228c979ebe036c5c2e0028ec76562d67d0919ca28258fec0ed60603142b5c57c4cfb1ea1e892d0fd2f33970142b179c415d6bea344fbcc82d133052e848a885160737c69eb02ca9f544831c8e3ffcf40cb7b415d24795fc8aaeb8e76bec262aea5e28fe5d6495c4b5895a612b1cc2122286add66356f3ecd309f970634f1b09da1507964d35575167317f13c7fd9f11af27ceea86e9a5b3494a27ba98ba38dd1fb72ef2c6163664fd8f7c946935cd4833121f505ff277c03d959d9a12f3389e9eb6701a8b29f72c20c6abb7bd8349dd2e120bdd59dca9f1a2a877f1677b59d7920ddf29b9d94f7c6879b78e31cf1b65b60fe349ef9d4976f46609ee34e33f647aafbf64f6323d18598905f2e73af75661397595b8f9c1e9a4e993946820da5378ca5b363560e95edce316e99bac6e6250efcf1cb58fdcf94c7557c2d7f763a688543462d54b64e178c2e64c6ebba356894973051907fd8de8ba908e822168b171c1707efcd9ac827e64313721876e2ff26ac34e88557a4a0dfde08eda81cf0c1465a89b68429e48966044c767563e1121db48c9b619fd7362afd15ec6aa19b28759d7977be4fbcad0cf8dd5dc5362259bd5cb5089a9d18db969afe1192571f5fcc0c4d6be281d23b9c1f9f32873c058adfa1bf57a3718686957edfd6e4b58aa959541127696d59fb2810d042ced227961eb19a424e4cf45bc6243217bb7561b7ee11f8c0b8f39480343a26f2da5fe79d5e213c01ea47155ffa91e7d7ba0bc8ccb018bd69cfe71dd8565a645d678b404a295397e83ae69dbf8505f6947a836b44823a92861124330fccd4bc4a2e20d9047bd919d82c89623caa87eb09bd584d58f42b35ef55fddc06dfb3957f3f507e5ca9b8b98947cc5bb68846755527ddf32ffa444e1c7a5654d4d377e04a9f22e1069804fdcdb251acb6bd6b32d100feb44286991d779d2b3e2b7f5cc5f8eb3ae166a3b6fb9df11e1867989a6f9b2028e4c73b4d418b51f6e870713cadafddb47a48c9a97283da214f02db3326d42438d9a7db580693ad1887f99d86bb5fafd6d07c2647fc80c2c5a1ed9ea3b95be65ca422080ddefca5b49ccd538f6bc67390f892d9e416f7e835f76dd90edc56256348d20560caeea05c0922cab60dbf0b57ddaaed6ded5a336e01485fd571dc12050461271cee347c31ac245bfee9128630dfcc43b6d88b5ba9937a6f6ab70b7d256784ff72297cfcfd0ffacd09b55fb832bf60f04d87c48c74972b9f18fa178ce4880b025d1c1097ddb929e8f7e02f1c0e03012bec0fa61a49eb1c2a50a45fc0d98b6649de325184006938e421321e8b366649d9b6ebadf77509c9d48844e80f7752fd7daaa5c938b946feaaac0d871203270a747035c7e2f697c84e792a55cbce76c0a25360f7acbeaab60627aa9c37064af75b67f46732844eb2f6b37226004afe451a9fbfbbcf7e72ade67b017e9209b5627fbe16789abd90326751a1fd1d93efc59f2650f979ba71938d784064922bee2874c4b76d5f26e39ea0a98cf175950137feff9456c88c6a295830183fae3a9c2312c25f3d81708d73488d15a587e7e7cdde3b77917eef29c8b5965c916a65c3c5a53b7313c3115d0a8bb4e16f6b80ff6f78adb756aba94ced86047562a2cd2fb25e9a4656f6359c3f2fde8b5ab38852853cbd7221cb4d59b7f0e79bd37f9ade073f62b75edbe63c13c0d02bf076d88f5b750ea640aad47ce97d6a0783398dd3fbb63734ed969470cf45200235650532224fc28caf1e36ca6b402ec4c978add40fc59f2113485875682139f8aa9aeb48d09178de919370b0cd0ebcab5e60e1b0a2fc153db0dae8e50b48561622a677d0f1afc149676f832e016e14007fb298dcb96f11a92a1ac8bd4cc7b34d659d6cd2c9817b586585e72080255b083bc84512277ffb7f561c6a7a08cd128bfe9b525da531f0bf04f11d3de102b3538835807ac0b2f4325fc6765d02d692ec82f5b338c8257029136fcd3427c09874ecc7492becdd6608eac4adf1abc3f7e08868a72e57ce4dcfc288a25af73d19f1118a9254963c1548cdca5fc7c921a7f218f8e71edd7969dfb35beae1091d7530e32236397fa9fcd232b441ff1b0177829468c198d659d247ccca4fbd58c625501e4368075d0e5e69a6f90952f5bbe48e85a303131dedf7f1a513b291598a545784e1013521877c25d6069d3a855652a4bad5b2df2e4da2de756a20e790b756dd2925ce824561e5892b5e064c7c7b996acc4e29597e0cd00956e9c57ec374714f846be7632d3075e38bead499163498810886c78a2cc73fb64fd48e186083ce911e0751b4dc63476859c2824fa532a4b1711c244619e702eeab19380aeb7b17f67fade3dcad8ddddd893a526cd5d04d8ae982c88029ec71bdd0772fd74adbdb378fc204ca411a2d8a50331516a28552be78f9725f32d1b3a6c7bdf3277c5f7e385c7ebbacc419ec7ca3c5b8f46dbefee59b6422a6b22d60527edc012f852077d925619874f7709f283e01678fed36528003a696ee431a817f34f453c143dc56b70e1f810a5380a555cc8c4fc6522ab544ce5d715caa302ebdd0aa8286b7ef5dd6dd48a8ad9566818f7509daf02db0b98b432f57f1d107ee95a86228728cab4062e27922381e1e2ee351af5e2ea0fd6d1cea70b3b8f4a50f0776fc9aa2a7d2dff6e1ea3769864104f09137b99960b69af13895d842649eacaed8ddf183beba3323640af8deb52b902c0974d685d19fc87c93eb80ad5d28e54363705ad39231d989522e94f000256bc8d93af138a45d67dad3e21fa9fb31d9327c6e71f61956d9daf4f97333112704136d3d1bf6fe0e4c002e10b684d2344300ec70fae0b50532ebace58f0e8318354a172cceacf27d01ff41cc8fef42443f62b0e15b5fcc0728630b96fb2c2b59634f4993bb1ce2eace6fb0f53e5f84bc5f58b1b66d59e3c75a98670496f105a703607211aa9e882e72f13e9fe07f0767ad4e5ac5c732b65301d8ceab36b5ff2f71958fb1b51d2e703ac506e68d4026160fd3f60440b8b8f554f1feeba5d53f71cbe60d143620f8fa779acb94c965b729207a5ab11f4a51b694c31606171da44a28d80cde296dff5724ff718d6377eb8534e616cff39af943ee4ce87b4fadded30c702d370a71072ab3e20f19b8c1b73fdbbb9c675352bb73ee85e22597fc0c439a33f5febe1629bd084af7193f8d1a1415b02ca54706711505cbae11ec6411b012cc3a3eddcfb002901b6e7565b9fbf4d605c147031888ceb590c14697d00970ce9095c6f7fee41ec6a15d7ef52dfedfff2a0d3dbb387b61232aee6ca202787038021e6aabda18e2adf6fd89aa491e65f9813d73412fbfff089752d713d7efa690ec4fc254b56908d3057f65997acf81aea589e272f8fa852849e488f1e0c0cb6cdb5f46ca92e36d39224e704850056d2e9b91909aed0f55d054e274415ecc39b8958335a14cfb0a42d7f26ef8e82592dfd03b3550b5193fba077994c682951968869574fd94976760d9bd9b334353eeda836cc8dab244e72095cc46833f02bb2f6df35601b3085664261abb67fc9ab9f27210e6827cd15ce16c55f0f7f5b8ab401f24032b19a53a9299b62ebf4a8cf7f4753d95126f008a8ce349036666de66bcaf40b27fa875efa98873e1ef9302e2a24bfe07bd1054bdf9ba9ad1b1075402f26d682833b947c762513ba5f07537bb712473184a60e04ace5adb8d982d6153b011ae0b2034adc0ff4a64e2c6561c2e0840cdab2120bc916cde9b7a92c4d332d0f83945fe55e3c8f4d93f22e7759c20241d92cca0ae5a3d06a127e5614df708cea1ad3b2f231c81460ff4c3f349c67a87135a4b67589ffce311832923f71796276e81f0537e265404c0ee06d5ed98a5ec5f8ad62db589eb585fc4627173b51fd4e897a3e8d2acbb82ec2996ac3a6823368a1e12a0536a9d1a7b2d31d80c46c292ff51395481d4f65c53fab867e27bec9156ee189d245d94877a1405dc9e1e996822ad47071a9ab36c9bfd02c41ea5ba21591793053b1b64758bae0addfcd69d169849bc1ee6ce5c08f0d3da5ecc1b6ab31e13af2fa5ce4d921163270901264a88ac6350e8fb6371663dd04146932238597258b123a8036250c190fbb3cfc6ebbf9e06c4a9053e8332c95c91a890a3d35ddd35f47e7ab606f3e345e12560e6d52243883da7b8910834042ad12e7fb3f08a0b14ef6aee22251999e6079be2ef5666d7d5ae00d161720262761da3f378c63cb151f4e94d034e9de949dfe796b905804ca555691023c30ea7cf0cb276e1e3ba65793291f8287d1064606bf5787421b9b9bfc05e9c5eac750de92519fe9e2592cd34a2ef6ec18efed5e7c13bfcfce47327cbecac358bbe6d44164849308cf91cd5ea87fa4b02ba4939e28141c7dad42714b019470d91808a8f46150677b6c90f267ecb39ef42afc95de0cbd016775c89d8213ec9d4e061e6493f237296f91abfc64176c0e885ef54af4136a724fadfe89a25d7599998acebc4a27f8fb5b26936bda5c3d5fec3373dcd9a0e99fc939641c50669adc54119582e8835575d1c57fa955cd29d870360620f91c3ff90d264013816352317ae226f7d7bad5db711f8973382f6cebd63cd519ddd08e1772649be75f64f4acc15f828dc0b305584b6dd2213194603c44e2964358d305aa97fb08568a0a955ad7a6f8d042754b4bbf2fb3414052719fd9841bef8360d1d3195c69414be882115c2c64fecdcbdaed3a2e943fdfef9a13520e41d32a787bcfe4f61e2b378d35aa70784a772cf8ebcaaeb105e4627516db2ababfcb8c11f224c3a48c86160d34d0ee59f02c31648ae4b0309b378f0bf63266967dcfb4f1cc1902f613c6d0d48915a9cf28a52b106544cde1b38ff2e2a1275fd0d3899ce7f7c6653c9017f7ac4aaa35bcb2811a8f9dbb56746b45475350e7c13d42abb5692377da7a4045ee644ce00f8699e3251d75621c82cd659ea3add277affe3ff792f7d24a3d0979ef82cfc0d409697ae2e8598854a8327f46974c901d309dc6dbe31913c59d821aa50c0fe95cc822e8f07bbb00e9a09bc9a570b9778d29308740bc336a41258d209c206f87a709aa43415da0096f7d177e509a7d625645fb098ccc45367d82235e952670ac5f82f8ced3f59fd9ee20ac75be609cc832417e807ddc40630cba4c91e0785edcb5f20b9e6dedb1ec172cd16fc034f410e9ce375ea855144aa3076317f649cf4efe4d7abf244984c4e", 0x1000}, 0x1006) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000000340), 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$llc(r1, &(0x7f0000000300)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000380)=0x10) dup(r2) sendfile(r2, r2, &(0x7f00000000c0), 0x8080fffffffe) 03:33:57 executing program 5: keyctl$join(0x1, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f00000001c0)={{0x0, @remote, 0x0, 0x0, 'nq\x00'}, {@multicast1}}, 0x44) creat(&(0x7f0000000240)='./file0\x00', 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @multicast1}, &(0x7f0000000180)=0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000d40)) syslog(0x0, &(0x7f0000000840)=""/177, 0xb1) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) open(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") [ 1014.178356] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 16) [ 1014.204046] FAT-fs (loop3): Filesystem has been set read-only [ 1014.224072] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000020) 03:33:57 executing program 3: epoll_create(0xffff) fstat(0xffffffffffffffff, &(0x7f0000001140)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)=""/4096) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:33:57 executing program 1: mincore(&(0x7f0000ffe000/0x1000)=nil, 0x1000, &(0x7f0000000080)=""/24) dup(0xffffffffffffff9c) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}}) getpgrp(0x0) write$FUSE_LK(0xffffffffffffffff, &(0x7f0000000380)={0x28}, 0x28) seccomp(0x0, 0x0, &(0x7f0000000100)) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00'}, 0x10) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) prctl$setmm(0x7, 0x0, &(0x7f0000ff6000/0x9000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000440)={0x0, @local, @remote}, &(0x7f0000000680)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @multicast1, @remote}, &(0x7f0000000b00)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000d00)=0x14, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d40)={'eql\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000d80)={0x0, @multicast1, @multicast1}, &(0x7f0000000dc0)=0xc) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={0xffffffffffffffff, &(0x7f0000000140)}, 0x10) syz_execute_func(&(0x7f0000000280)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d235023362e66410f383701f30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:33:57 executing program 0: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000733000), 0x2c) bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4), 0x2c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000600)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f78990f7beefafa2179660f38302fe5e54175450f2e1a400fbcc1c44379dfb9d6adbe90dfe2989f3f") socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000040)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@local, @in6=@local}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f00000000c0)=0xe8) memfd_create(&(0x7f00000005c0)='/dev/vcs#\x00', 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000680)={0x2, 0x0, @local}, &(0x7f00000006c0)=0x10, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000580)='/dev/vga_arbiter\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000300)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000340)=0xc) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000440), 0x4) getpgrp(0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000140)) geteuid() ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000180)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000540)) syz_genetlink_get_family_id$nbd(&(0x7f0000000400)='nbd\x00') sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000003c0), 0xc, &(0x7f00000004c0)={&(0x7f0000000800)=ANY=[]}}, 0x0) syz_open_dev$vcsn(&(0x7f0000000380)='/dev/vcs#\x00', 0x0, 0x0) 03:33:57 executing program 4: eventfd(0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0xfffffffffffffd57) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000040), &(0x7f0000002380), &(0x7f00000023c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002780)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002ec0)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:57 executing program 2: keyctl$set_reqkey_keyring(0x15, 0x0) pipe(&(0x7f00000001c0)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000680)) clock_getres(0x0, &(0x7f00000000c0)) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000000600)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$key(0xf, 0x3, 0x2) syz_open_dev$evdev(&(0x7f0000000700)='/dev/input/event#\x00', 0x0, 0x0) write$P9_RLOCK(0xffffffffffffffff, &(0x7f00000006c0)={0x8}, 0x8) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000200)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@loopback}, &(0x7f00000002c0)=0x14) pipe(&(0x7f0000000640)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000180)) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000740)={@in6={{0xa, 0x0, 0x0, @mcast2}}, 0x0, 0x0, 0x0, "1d6561754d0affa55b5d8445133408eef4d491bc6549cd858aeb36883e2ab562b135ee29b30f78a4ef1ce5d14b8136ab0119921c99024044e0f3acc2cc4ee15fdabc0d02799fd15833618257cfe22b25"}, 0xd8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000000)={0x0, @local, @multicast1}, &(0x7f0000000100)=0xc) lsetxattr$trusted_overlay_upper(&(0x7f0000000500)='./file1\x00', &(0x7f0000000540)='trusted.overlay.upper\x00', &(0x7f00000018c0)=ANY=[], 0x0, 0x0) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000240)) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000600)={0x0, @aes256, 0x0, "acf5508498aefb51"}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000300)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@rand_addr, @in=@remote}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f00000004c0)=0xe8) getgid() seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000005c0)=0x14) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:33:58 executing program 1: getpid() keyctl$set_reqkey_keyring(0xa, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000080)) getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000300)='/dev/null\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000380)={0x0, 0x0, 0x0, {0x77359400}}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000040)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc7397c2a0f0fcdae300f38211a40a5c441657538c48391683f000f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:33:58 executing program 5: signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000900)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000200), 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000080)=ANY=[], 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000001c0)=0x1c) recvmmsg(0xffffffffffffffff, &(0x7f000000b880), 0x0, 0x0, 0x0) geteuid() setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000ba40)={{{@in6=@dev, @in=@multicast2}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, 0xe8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000080)=@assoc_value, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000240)={0x0, @in6={{0xa, 0x0, 0x0, @dev}}}, 0x84) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") geteuid() 03:33:58 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f00004f7000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[@ANYRESHEX], 0xfffffe2d) 03:33:58 executing program 3: pipe2(&(0x7f0000000140), 0x0) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f00000005c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000000040)) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) socket$inet_udp(0x2, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getresgid(&(0x7f0000000440), &(0x7f0000000480), &(0x7f0000000580)) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000040)) setresgid(0x0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x18}, 0x18) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) syz_execute_func(&(0x7f0000000340)="428055a0690fef69dc3641ffaa32233333ce41ff0f3766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff754547daa2852b6f25050d7de5101bc6c65d14b706e298987b7f") write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'team0\x00'}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000480)={0x0, 0x1, 0x6, @broadcast}, 0x10) socket$inet_icmp_raw(0x2, 0x3, 0x1) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.upper\x00', &(0x7f0000000140)=ANY=[], 0x0, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, &(0x7f0000000380)={0x0, {{0x2, 0x0, @loopback}}}, 0x88) getpid() syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefae5e5417545c4010d64ac1e5d31a3b7e2989f3f") 03:33:58 executing program 4: eventfd(0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0xfffffffffffffd57) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000040), &(0x7f0000002380), &(0x7f00000023c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002780)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002ec0)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:58 executing program 0: clock_getres(0x0, &(0x7f0000000400)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) pipe2(&(0x7f0000000140), 0x0) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f00000005c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000000040)) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) socket$inet_udp(0x2, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getresgid(&(0x7f0000000440), &(0x7f0000000480), &(0x7f0000000580)) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000040)) setresgid(0x0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x18}, 0x18) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) syz_execute_func(&(0x7f0000000340)="428055a0690fef69dc3641ffaa32233333ce41ff0f3766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff754547daa2852b6f25050d7de5101bc6c65d14b706e298987b7f") write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'team0\x00'}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000480)={0x0, 0x1, 0x6, @broadcast}, 0x10) socket$inet_icmp_raw(0x2, 0x3, 0x1) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.upper\x00', &(0x7f0000000140)=ANY=[], 0x0, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, &(0x7f0000000380)={0x0, {{0x2, 0x0, @loopback}}}, 0x88) getpid() setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000500)={@dev}, 0x14) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000080), 0x12) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefae5e5417545c4010d64ac1e5d31a3b7e2989f3f") 03:33:58 executing program 2: clock_adjtime(0x0, &(0x7f00000004c0)) eventfd2(0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000840)=ANY=[], 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0), 0xc, &(0x7f0000000200)={&(0x7f0000000380)=ANY=[]}}, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, &(0x7f0000000180)) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000140), 0x4) getsockname$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000002c0)=0x14) getpgrp(0xffffffffffffffff) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000000c0)) getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004b00)={{{@in6=@local, @in=@broadcast}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000004c00)=0xe8) stat(&(0x7f0000004c40)='./file0\x00', &(0x7f0000004c80)) 03:33:58 executing program 3: memfd_create(&(0x7f0000000180)='\x00', 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000380)={0x1, &(0x7f00000000c0)=[{0x2000000000000006, 0x0, 0x0, 0x100000058fe4}]}) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) accept$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000640)={@mcast1}, &(0x7f00000006c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000009c0)={'team0\x00'}) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000004240)) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000000)) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x0) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, &(0x7f00000003c0)) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000100)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000140)) syz_execute_func(&(0x7f0000000080)="428055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e6989f") syz_extract_tcp_res$synack(&(0x7f0000000680), 0x1, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000540)) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000480)=@generic) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000280)) ptrace$peekuser(0x3, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000008c0)={@rand_addr, @remote}, &(0x7f0000000900)=0xc) getuid() stat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getresgid(&(0x7f0000003f00), &(0x7f0000003f40), &(0x7f0000003f80)) getresuid(&(0x7f0000003fc0), &(0x7f0000004000), &(0x7f0000004040)) getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004140), 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000200)) io_setup(0x0, &(0x7f00000002c0)) syz_execute_func(&(0x7f0000000580)="42805da06a0f460f46dc0f019e263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf26f042080b660f38302f3e26f043108900000000450f2e628af540d917c4a1ff701c3f04d6adbe90dfe2987e6e") 03:33:59 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000280)) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0), &(0x7f00000011c0)=0x368) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="52805da0990fef69dc0f01eece73fe02ff02ff380f38211af3f081a4768cca0000a08081b5e5bc2b0000002167f00fbab204000000ca63ae79dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") syz_open_procfs(0x0, &(0x7f00000000c0)="be0b2b2f69705f767300") syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000400)={{{@in=@local, @in6=@dev}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000580)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'vcan0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000600)={@mcast2}, &(0x7f0000000640)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000007c0)={{{@in6, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f00000008c0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000900)={@local, @loopback}, &(0x7f0000000940)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000b40)={'bond0\x00'}) syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000b80)={'team0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000cc0)=0x14) syz_mount_image$nfs4(&(0x7f0000000080)='nfs4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000980), 0x0, &(0x7f0000000a00)='@trusted\x00') accept4(0xffffffffffffffff, &(0x7f0000002300)=@xdp, &(0x7f0000002380)=0x80, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000023c0)={@broadcast}, &(0x7f0000002400)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002500)={{{@in6=@remote, @in6=@local}}, {{@in=@rand_addr}, 0x0, @in=@rand_addr}}, &(0x7f0000002600)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002640)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in6=@ipv4={[], [], @rand_addr}}}, &(0x7f0000002740)=0xe8) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000a80)={0x0, &(0x7f0000000a40)}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002b80)={@multicast1, @remote}, &(0x7f0000002bc0)=0xc) setregid(0x0, 0x0) 03:33:59 executing program 1: io_setup(0x1, &(0x7f0000000480)) socket$packet(0x11, 0x0, 0x300) eventfd(0x0) getpeername(0xffffffffffffff9c, &(0x7f0000000600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000680)=0xffffffffffffffdb) dup2(0xffffffffffffff9c, 0xffffffffffffffff) openat$ppp(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/ppp\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000840)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) openat(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) io_submit(0x0, 0x0, &(0x7f0000000b40)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f00000000c0), &(0x7f0000000040)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000140)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000300)) inotify_init1(0x0) prctl$void(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000003c0)=@fragment, 0x8) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000180)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000440)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f000045fff8)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:33:59 executing program 5: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x14}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) 03:33:59 executing program 5: madvise(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xa) clock_gettime(0x0, &(0x7f0000001680)) dup(0xffffffffffffffff) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000040)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) request_key(&(0x7f0000000080)='user\x00', &(0x7f00000000c0), &(0x7f00000001c0)='\x00', 0xfffffffffffffffa) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da0124fefeddc0f01eea873fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 03:33:59 executing program 4: eventfd(0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0xfffffffffffffd57) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000040), &(0x7f0000002380), &(0x7f00000023c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002780)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002ec0)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x1bb, 0x0) 03:33:59 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8943, &(0x7f0000000200)="766574000000000000000000bd6800") pselect6(0x40, &(0x7f0000000080), &(0x7f00000000c0)={0x8}, &(0x7f0000000100), &(0x7f0000000140)={0x0, 0x1c9c380}, &(0x7f0000000280)={&(0x7f0000000240), 0x8}) 03:33:59 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000100)="2d42d54e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)}}, 0x20) sendfile(r0, r0, &(0x7f0000317000), 0xff8) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000200)=0x5) 03:34:00 executing program 2: signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0xfffffffffffffd95) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000002c0)) eventfd2(0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000200)=ANY=[]) fcntl$getflags(0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) getpeername$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000080)=0x6e) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000540)=""/194) signalfd(0xffffffffffffffff, &(0x7f0000000240), 0x39d) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000004c0)) getresuid(&(0x7f0000000500), &(0x7f0000000640), &(0x7f0000000680)) getgid() fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000000200), &(0x7f0000000ac0), &(0x7f0000000b00)) getgid() getpid() fstat(0xffffffffffffffff, &(0x7f0000000b40)) stat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c80), &(0x7f0000000cc0)=0xc) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000d00)) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) lstat(&(0x7f0000000e00)='./file0\x00', &(0x7f0000000e40)) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000024c0)={{{@in6=@remote, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@local}}, &(0x7f00000025c0)=0xe8) lstat(&(0x7f0000002600)='./file0\x00', &(0x7f0000002640)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000026c0), &(0x7f0000002700)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002740)={{{@in6=@mcast1, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@remote}}, &(0x7f0000002840)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002880), &(0x7f00000028c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) stat(&(0x7f0000002980)='./file0\x00', &(0x7f00000029c0)) getresgid(&(0x7f0000002a40), &(0x7f0000002a80), &(0x7f0000002ac0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002b00), &(0x7f0000002b40)=0xc) stat(&(0x7f0000002b80)='./file0\x00', &(0x7f0000002bc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c40), &(0x7f0000002c80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002cc0), &(0x7f0000002d00)=0xc) lstat(&(0x7f0000002d40)='./file0\x00', &(0x7f0000002d80)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:34:00 executing program 0: prctl$seccomp(0x4, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) keyctl$set_reqkey_keyring(0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:34:00 executing program 1: lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f00000000c0)='./file0\x00', 0x8, 0x0) gettid() getpid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000200), &(0x7f00000002c0)=0xc) syz_open_procfs(0x0, &(0x7f0000000300)='ns\x00') accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x0) mlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) timerfd_create(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0124fefeddc0f01eea873fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 03:34:00 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000100)="2d42d54e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)}}, 0x20) sendfile(r0, r0, &(0x7f0000317000), 0xff8) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000200)=0x5) 03:34:00 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000003c0)={0x0, 0x7, 0x7, 0x7}, &(0x7f0000000400)=0x10) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f0000000040)) r1 = socket$l2tp(0x18, 0x1, 0x1) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000000c0)="809934b108832415243f49a936f7a035e017a99a25d8f2cb497555dba9ed810ec1e3ee92fff7665b9bf759b17318f5a9ba8c125ea8c425abc9a15a3282b5ff86f79aec93bf7c6574a25ff10397c644a05be53371e10c99a1e3913f97dcd4", 0x5e) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@rand_addr, 0x4d4, 0x2b}, 0x0, @in6=@mcast2}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f0000000480)) 03:34:00 executing program 4: keyctl$dh_compute(0x14, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) socket$inet(0x2, 0xa, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000002f00)=""/4096, &(0x7f0000000600)=0x1321) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mknod$loop(&(0x7f00000003c0)='./file0\x00', 0x0, 0xffffffffffffffff) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) prctl$getname(0x10, &(0x7f0000000200)=""/133) semget(0xffffffffffffffff, 0x0, 0x0) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000001a40)=""/204) semget$private(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000680)=ANY=[], 0x0) open(&(0x7f0000000480)='./file0\x00', 0x0, 0x0) set_tid_address(&(0x7f0000000180)) accept$inet6(0xffffffffffffffff, &(0x7f00000007c0), &(0x7f0000000780)=0x1c) 03:34:00 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000100)="2d42d54e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)}}, 0x20) sendfile(r0, r0, &(0x7f0000317000), 0xff8) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000200)=0x5) 03:34:00 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000003c0)={0x0, 0x7, 0x7, 0x7}, &(0x7f0000000400)=0x10) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f0000000040)) r1 = socket$l2tp(0x18, 0x1, 0x1) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000000c0)="809934b108832415243f49a936f7a035e017a99a25d8f2cb497555dba9ed810ec1e3ee92fff7665b9bf759b17318f5a9ba8c125ea8c425abc9a15a3282b5ff86f79aec93bf7c6574a25ff10397c644a05be53371e10c99a1e3913f97dcd4", 0x5e) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@rand_addr, 0x4d4, 0x2b}, 0x0, @in6=@mcast2}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f0000000480)) 03:34:00 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000100)="2d42d54e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)}}, 0x20) sendfile(r0, r0, &(0x7f0000317000), 0xff8) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000200)=0x5) 03:34:01 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000003c0)={0x0, 0x7, 0x7, 0x7}, &(0x7f0000000400)=0x10) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f0000000040)) r1 = socket$l2tp(0x18, 0x1, 0x1) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000000c0)="809934b108832415243f49a936f7a035e017a99a25d8f2cb497555dba9ed810ec1e3ee92fff7665b9bf759b17318f5a9ba8c125ea8c425abc9a15a3282b5ff86f79aec93bf7c6574a25ff10397c644a05be53371e10c99a1e3913f97dcd4", 0x5e) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@rand_addr, 0x4d4, 0x2b}, 0x0, @in6=@mcast2}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f0000000480)) 03:34:01 executing program 0: prctl$setmm(0x8, 0x5, &(0x7f0000002000/0x3000)=nil) gettid() openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000140)) getpgrp(0x0) accept$inet(0xffffffffffffff9c, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000002600), 0x0, 0x0, &(0x7f0000000680)={0x0, 0x1c9c380}) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() inotify_init() seccomp(0x0, 0x0, &(0x7f0000000100)={0x1fb, &(0x7f00000005c0)}) dup(0xffffffffffffffff) geteuid() ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:34:01 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'ip_vti0\x00', {0x2, 0x0, @multicast2}}) prctl$setmm(0x23, 0x0, &(0x7f0000ff9000/0x4000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) rt_sigreturn() openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) socket$nl_route(0x10, 0x3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') accept4$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000380)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000480)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000001f40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001f80)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001fc0)={@dev, @dev}, &(0x7f0000002000)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000002040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002080)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000020c0)={'vcan0\x00'}) recvmsg(0xffffffffffffffff, &(0x7f0000002340)={&(0x7f0000002100)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f0000002240), 0x0, &(0x7f0000002280)=""/142, 0x8e}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002380)={{{@in=@broadcast}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000002480)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000024c0)={'vcan0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002500)={0x0, @broadcast, @loopback}, &(0x7f0000002540)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002580)={@broadcast, @rand_addr}, &(0x7f00000025c0)=0xc) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000002900)={&(0x7f0000002600)=@xdp, 0x80, &(0x7f0000002840), 0x0, &(0x7f0000002880)=""/68, 0x44}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002940)={{{@in=@multicast2, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in6=@dev}}, &(0x7f0000002a40)=0xe8) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000002f40)={&(0x7f0000002d80)=@can, 0x80, &(0x7f0000002ec0), 0x0, &(0x7f0000002f00)=""/48, 0x30}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003040)={{{@in6=@dev}}, {{@in=@loopback}, 0x0, @in=@local}}, &(0x7f0000003140)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007640), 0x0, 0x0, &(0x7f0000004400)={0x77359400}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000007780)={{{@in=@dev, @in6=@local}}, {{@in=@local}, 0x0, @in=@dev}}, &(0x7f0000004440)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000007880)={{{@in=@multicast2, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000007980)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000007a80)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000007ac0)={{{@in6=@ipv4={[], [], @local}, @in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000007bc0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000007cc0)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007d00)={{{@in6, @in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in6}}, &(0x7f0000007e00)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000007e40)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000007e80)={@rand_addr, @loopback}, &(0x7f0000007ec0)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000007f00)={'vcan0\x00'}) syz_execute_func(&(0x7f0000000400)="428055a06b6969ef69dc00d9901837c4c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:34:01 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000003c0)={0x0, 0x7, 0x7, 0x7}, &(0x7f0000000400)=0x10) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f0000000040)) r1 = socket$l2tp(0x18, 0x1, 0x1) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000000c0)="809934b108832415243f49a936f7a035e017a99a25d8f2cb497555dba9ed810ec1e3ee92fff7665b9bf759b17318f5a9ba8c125ea8c425abc9a15a3282b5ff86f79aec93bf7c6574a25ff10397c644a05be53371e10c99a1e3913f97dcd4", 0x5e) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@rand_addr, 0x4d4, 0x2b}, 0x0, @in6=@mcast2}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f0000000480)) 03:34:01 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") restart_syscall() 03:34:01 executing program 1: ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) seccomp(0x0, 0x0, &(0x7f0000000100)) mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) request_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080), &(0x7f0000000140)="252d6370757365745c1b00", 0xfffffffffffffffc) futex(&(0x7f0000000500), 0x0, 0x0, &(0x7f0000000880)={0x0, 0x989680}, &(0x7f0000000300), 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000000c0)) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)) getpgid(0x0) syz_open_procfs(0x0, &(0x7f0000000400)='children\x00') ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) semget$private(0x0, 0x0, 0x0) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000440)=""/240) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000180)) syz_execute_func(&(0x7f00000001c0)="42805da0556d6def69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)=""/44, &(0x7f0000000280)=0x2c) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000002c0)={'veth0\x00', {0x2, 0x0, @broadcast}}) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)) syz_execute_func(&(0x7f00000003c0)="42805da0120fef69dc0f58eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:34:01 executing program 4: pselect6(0x40, &(0x7f0000000740), &(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000880)={&(0x7f0000000840)={0x9}, 0x8}) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000002e80), 0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000440)=0x1c, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000480)) dup(0xffffffffffffffff) write$P9_RLINK(0xffffffffffffffff, &(0x7f0000000940)={0x7}, 0x7) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fchdir(0xffffffffffffffff) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000380)='/dev/loop-control\x00', 0x0, 0x0) getpid() ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, &(0x7f00000003c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f00000001c0)=0xc) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000200)) recvfrom(0xffffffffffffffff, &(0x7f00000004c0)=""/143, 0x8f, 0x0, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) syz_execute_func(&(0x7f0000000140)="42805da0320fef69dc0f01eece73fe19fa380f38211af3f242d2be00000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:34:01 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000003c0)={0x0, 0x7, 0x7, 0x7}, &(0x7f0000000400)=0x10) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f0000000040)) r1 = socket$l2tp(0x18, 0x1, 0x1) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000000c0)="809934b108832415243f49a936f7a035e017a99a25d8f2cb497555dba9ed810ec1e3ee92fff7665b9bf759b17318f5a9ba8c125ea8c425abc9a15a3282b5ff86f79aec93bf7c6574a25ff10397c644a05be53371e10c99a1e3913f97dcd4", 0x5e) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@rand_addr, 0x4d4, 0x2b}, 0x0, @in6=@mcast2}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f0000000480)) 03:34:01 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000003c0)={0x0, 0x7, 0x7, 0x7}, &(0x7f0000000400)=0x10) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f0000000040)) r1 = socket$l2tp(0x18, 0x1, 0x1) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000000c0)="809934b108832415243f49a936f7a035e017a99a25d8f2cb497555dba9ed810ec1e3ee92fff7665b9bf759b17318f5a9ba8c125ea8c425abc9a15a3282b5ff86f79aec93bf7c6574a25ff10397c644a05be53371e10c99a1e3913f97dcd4", 0x5e) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@rand_addr, 0x4d4, 0x2b}, 0x0, @in6=@mcast2}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f0000000480)) 03:34:02 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) add_key(&(0x7f0000000000)='big_key\x00', &(0x7f0000000040), &(0x7f0000000680), 0x0, 0xffffffffffffffff) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f00000004c0)=ANY=[], &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a0c6660f54fe9038e379392a8e0f38211a64a741fff040d9fbe5e5417545800f2e1a1a01460f01ee31a3b786e298262e6426f30f2b0509000000bd3f") 03:34:02 executing program 3: futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f0000000700), &(0x7f00000003c0), 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000140)) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000900)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000200), 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000080)=ANY=[], 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000001c0)=0x1c) recvmmsg(0xffffffffffffffff, &(0x7f000000b880), 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") geteuid() syz_execute_func(&(0x7f00000001c0)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") 03:34:02 executing program 0: prctl$getname(0x10, &(0x7f0000000200)=""/133) semget$private(0x0, 0x0, 0x0) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000140)=""/134) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:34:02 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000003c0)={0x0, 0x7, 0x7, 0x7}, &(0x7f0000000400)=0x10) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f0000000040)) r1 = socket$l2tp(0x18, 0x1, 0x1) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000000c0)="809934b108832415243f49a936f7a035e017a99a25d8f2cb497555dba9ed810ec1e3ee92fff7665b9bf759b17318f5a9ba8c125ea8c425abc9a15a3282b5ff86f79aec93bf7c6574a25ff10397c644a05be53371e10c99a1e3913f97dcd4", 0x5e) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@rand_addr, 0x4d4, 0x2b}, 0x0, @in6=@mcast2}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f0000000480)) 03:34:02 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000080)='bond_slave_0\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000780)='id_resolver\x00', &(0x7f00000007c0), &(0x7f0000000800)='\x00', 0x0) clock_gettime(0x0, &(0x7f0000000040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000003580), 0x4000000000001ca, 0x0, &(0x7f0000000680)) getsockname(0xffffffffffffffff, &(0x7f0000004540)=@pptp={0x18, 0x2, {0x0, @multicast2}}, &(0x7f0000001740)=0x80) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0ad6969ef69dc00d99069203737c33bc481d8145200060f38792117172564a70f157a9e660f478431508c0000e5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)) getuid() 03:34:02 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) unshare(0x24020400) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000180)={r2, 0x0, 0x4000000002}) 03:34:02 executing program 4: setpriority(0x5, 0x0, 0x0) open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_all\x00', 0x0, 0x0) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, &(0x7f0000000300)) syz_emit_ethernet(0x0, &(0x7f0000000380)=ANY=[], 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000340)={@remote, @local}, &(0x7f0000000700)=0xc) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000500)={0x0, 0x1, 0x29e, @random="c5e26b7b74da"}, 0xfffffffffffffd99) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000400), 0x32a) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000e80)=ANY=[]) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0), 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000d80)) getresuid(&(0x7f0000000dc0), &(0x7f0000000e00), &(0x7f0000000e40)) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000e80), &(0x7f0000000ec0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000f00)={{{@in6=@dev, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000001000)=0xe8) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001080)={{{@in6, @in6=@local}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000001180)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000011c0), &(0x7f0000001200)=0xc) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000001440)) getgid() getpgid(0x0) stat(&(0x7f00000014c0)='./file1\x00', &(0x7f0000001500)) fstat(0xffffffffffffffff, &(0x7f0000001580)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001600)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001640)={{{@in=@loopback, @in6}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000001740)=0xe8) getgroups(0x0, &(0x7f0000001780)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000017c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001800), &(0x7f0000001840)=0xc) fstat(0xffffffffffffffff, &(0x7f0000001880)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001900)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001940)={{{@in=@dev, @in6=@remote}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@multicast1}}, &(0x7f0000001a40)=0xe8) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001ec0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001e80)='net/mcfilter\x00'}, 0x30) fstat(0xffffffffffffffff, &(0x7f0000001f00)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000001f80)='cpuacct.usage_all\x00', 0xffffffffffffffff}, 0x30) getresuid(&(0x7f0000002000), &(0x7f0000002040), &(0x7f0000002080)) getgroups(0x0, &(0x7f00000020c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002100)) getuid() getgroups(0x0, &(0x7f0000002140)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002180), &(0x7f00000021c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002200)={{{@in6=@mcast2, @in6=@local}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f0000002300)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002340), &(0x7f0000002380)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000023c0), &(0x7f0000002400)=0xc) fstat(0xffffffffffffffff, &(0x7f0000002440)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002680), 0x0, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000940)=ANY=[], &(0x7f0000000140)) getegid() ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000180)={0x0, {}, {0x2, 0x0, @dev}, {0x2, 0x0, @rand_addr}}) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000440)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000540)) syz_open_procfs(0x0, &(0x7f00000005c0)='net/mcfilter\x00') chown(&(0x7f00000004c0)='./file1\x00', 0x0, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000003c0)={@broadcast, @remote}, 0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000007c0)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000680), 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000200)=""/59) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:34:02 executing program 2: keyctl$set_reqkey_keyring(0x7, 0xfffffffffffffffc) pipe(&(0x7f0000000500)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0) add_key(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000300), &(0x7f00000002c0), 0xcd, 0xfffffffffffffffd) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000180)) add_key(&(0x7f0000000040)='ceph\x00', &(0x7f0000000080), &(0x7f0000000180), 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='trusted.overlay.redirect\x00', &(0x7f0000000480)='./file0\x00', 0x8, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x0, 0x19, [], 0x0, &(0x7f0000000240), &(0x7f0000000280)=""/25}, &(0x7f00000002c0)=0x78) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000440)) bind$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @mcast2}, 0x1c) syz_execute_func(&(0x7f00000003c0)="428055a08269d069ef69dc15d9c4c1fdc4817565714c0f0f5bcdaaf34a0f38f6bb2a88699f0f38211a40a564a7400f01ef7d0ff34e0f2d4f6fec76ec1a7201c46249aae701ee9f") syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000980)={@empty, @multicast2}, &(0x7f00000009c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000e00)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000e40)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000e80)={@loopback, @broadcast}, &(0x7f0000000ec0)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000f00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000f40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000f80)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000001e00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001e40)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001ec0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000001f00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001f40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001f80)={{{@in=@broadcast, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002080)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000020c0)={{{@in=@loopback, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in6=@dev}}, &(0x7f00000021c0)=0xe8) recvmsg(0xffffffffffffffff, &(0x7f0000002400)={&(0x7f0000002200)=@hci, 0x80, &(0x7f0000002380), 0x0, &(0x7f00000023c0)=""/22, 0x16}, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000002440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002480)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000024c0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002500)={{{@in=@local, @in=@local}}, {{@in6}, 0x0, @in6=@loopback}}, &(0x7f0000002600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002980)={{{@in6=@remote, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000002a80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002b00)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002b40)={{{@in=@rand_addr, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000002c40)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002c80)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002e00)={@mcast1}, &(0x7f0000002e40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002e80)={0x0, @rand_addr}, &(0x7f0000002ec0)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000002f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002fc0)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003100)={@broadcast, @remote}, &(0x7f0000003140)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003180)={'ip6gretap0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003200)={{{@in6=@mcast1, @in6=@dev}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000003300)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003340)={@local}, &(0x7f0000003380)=0x14) 03:34:03 executing program 3: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000240)='proc\'\x00'}, 0x10) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="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", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840), 0x0, &(0x7f00000000c0)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) 03:34:03 executing program 1: setrlimit(0x0, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$dri(&(0x7f00000003c0)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_CAP(0xffffffffffffffff, 0xc010640c, &(0x7f0000001480)) syz_execute_func(&(0x7f0000000400)="428055a0ad6969ef69dc00d99069203737c33bc481d8145200060f38792117172564a70f157a9e660f478431508c0000e5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") socket$vsock_stream(0x28, 0x1, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000140)) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff}, 0xc) socket$inet6_udplite(0xa, 0x2, 0x88) epoll_create(0x0) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000040)) gettid() getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000014c0), &(0x7f0000001500)=0x4) utimensat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{0x0, 0x2710}, {0x0, 0x2710}}, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000380)) fsync(0xffffffffffffffff) mount(&(0x7f0000000280)=ANY=[], &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='udf\x00', 0x0, &(0x7f0000000340)='!wlan0GPL\x00') 03:34:03 executing program 0: ioprio_set$uid(0x3, 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000280)) keyctl$set_reqkey_keyring(0x3, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:34:03 executing program 3: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000240)='proc\'\x00'}, 0x10) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="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", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840), 0x0, &(0x7f00000000c0)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) 03:34:03 executing program 5: pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x290) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in={{0x2, 0x0, @rand_addr}}}, &(0x7f0000000380)=0x98) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, &(0x7f00000003c0), 0x8) timerfd_create(0x0, 0x0) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000180)}) syz_execute_func(&(0x7f0000000140)="428055a06b6969ef69dc00d99069203637c3397c2aaf200f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:03 executing program 3: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000240)='proc\'\x00'}, 0x10) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="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", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840), 0x0, &(0x7f00000000c0)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) 03:34:04 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) connect(r0, &(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "090f1f4e59abf0f25d528260de800d7a7439112d0272d84f8dd3f2f4e99dccc7dbfa09df65623206904ff94d5c7aa10d1aa9e3bc69db9f7549c06a31a7c3b5"}, 0x80) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000000200)="a1", 0x1, 0x0, &(0x7f0000000240)={0xa, 0x0, 0x0, @loopback}, 0x1c) 03:34:04 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000040)=r1) 03:34:04 executing program 3: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000240)='proc\'\x00'}, 0x10) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="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", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840), 0x0, &(0x7f00000000c0)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) 03:34:04 executing program 1: keyctl$set_reqkey_keyring(0x10, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000180)}) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe(&(0x7f0000000180)) write$evdev(0xffffffffffffffff, &(0x7f0000000380), 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200), &(0x7f0000000240), 0x0, 0xfffffffffffffffa) getgroups(0x0, &(0x7f0000000400)) accept4(0xffffffffffffffff, &(0x7f0000000600)=@nl=@proc, &(0x7f0000000700)=0x80, 0x0) msgget(0xffffffffffffffff, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000240)=""/227) pipe(&(0x7f0000000040)) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x3ce}, 0x58) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000340)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000007c0)) stat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000900), 0x36}, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f00000006c0)) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000980)=ANY=[], 0x0) 03:34:04 executing program 0: clone(0x200, &(0x7f00000000c0), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000280)) mknod(&(0x7f0000f80000)='./file0\x00', 0x103c, 0x0) execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000000300), &(0x7f0000000200)) r0 = creat(&(0x7f00000000c0)='./file1\x00', 0x181) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ptmx\x00', 0x0, 0x0) read(r1, &(0x7f0000000300)=""/11, 0xb) dup2(r1, r0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000002c0)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) execve(&(0x7f0000000180)='./file1\x00', &(0x7f0000000780), &(0x7f0000000800)) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) 03:34:04 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000040)=r1) 03:34:04 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) sched_getaffinity(0x0, 0x8, &(0x7f0000000100)) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) ioctl$UI_SET_MSCBIT(0xffffffffffffffff, 0x40045568, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000140)) open_by_handle_at(r1, &(0x7f0000000180)={0x25, 0x0, "25614b7295449964dba54b18e7d2a40f832f3e696a18f0b6d765849c4a"}, 0x200) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080), 0x0) 03:34:04 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000040)=r1) 03:34:04 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) sched_getaffinity(0x0, 0x8, &(0x7f0000000100)) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) ioctl$UI_SET_MSCBIT(0xffffffffffffffff, 0x40045568, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000140)) open_by_handle_at(r1, &(0x7f0000000180)={0x25, 0x0, "25614b7295449964dba54b18e7d2a40f832f3e696a18f0b6d765849c4a"}, 0x200) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080), 0x0) 03:34:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$setpipe(r0, 0xf, 0x0) 03:34:04 executing program 0: shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffa000/0x4000)=nil) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f00000001c0)=""/126, &(0x7f0000000240)=0x7e) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000980)=""/41) ustat(0x0, &(0x7f0000000080)) pipe2$9p(&(0x7f0000001600), 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) close(0xffffffffffffffff) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f0000000240), &(0x7f0000000400)}}, &(0x7f0000000340)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000300), 0x4) timer_gettime(0x0, &(0x7f0000001400)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) semget(0xffffffffffffffff, 0x0, 0x0) semctl$SETVAL(0x0, 0x0, 0x10, &(0x7f0000000580)) seccomp(0x0, 0x0, &(0x7f0000000100)) symlinkat(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') eventfd2(0x0, 0x0) getresuid(&(0x7f00000005c0), &(0x7f0000000640), &(0x7f0000000680)) getegid() getegid() getgroups(0x0, &(0x7f00000002c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@multicast1}}, {{@in=@broadcast}, 0x0, @in=@broadcast}}, &(0x7f0000000800)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000840)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@dev, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f00000008c0)=0xe8) getegid() write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000d00)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x100000058fe4}]}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x50, &(0x7f0000000480)}, 0x6a) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000500), 0x4) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000000)={'syzkaller0\x00', {0x2, 0x0, @multicast2}}) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f0000000040)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000180)={0xa0}, 0xa0) syz_execute_func(&(0x7f0000000380)="af8055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f382143fd64a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e6989f") getsockname$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) syz_execute_func(&(0x7f0000000380)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d0629002ef3ad0f993d233d234142d85d0967f20f7d44a200660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 03:34:04 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) sched_getaffinity(0x0, 0x8, &(0x7f0000000100)) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) ioctl$UI_SET_MSCBIT(0xffffffffffffffff, 0x40045568, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000140)) open_by_handle_at(r1, &(0x7f0000000180)={0x25, 0x0, "25614b7295449964dba54b18e7d2a40f832f3e696a18f0b6d765849c4a"}, 0x200) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080), 0x0) 03:34:04 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000040)=r1) 03:34:04 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) sched_getaffinity(0x0, 0x8, &(0x7f0000000100)) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) ioctl$UI_SET_MSCBIT(0xffffffffffffffff, 0x40045568, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000140)) open_by_handle_at(r1, &(0x7f0000000180)={0x25, 0x0, "25614b7295449964dba54b18e7d2a40f832f3e696a18f0b6d765849c4a"}, 0x200) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080), 0x0) 03:34:04 executing program 3: msgget(0xffffffffffffffff, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) openat$cuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/cuse\x00', 0x2, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000240)) getresgid(&(0x7f00000002c0), &(0x7f00000003c0), &(0x7f0000000440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) getpgid(0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)) getpid() openat$null(0xffffffffffffff9c, &(0x7f0000000300)='/dev/null\x00', 0x0, 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000640)) syz_genetlink_get_family_id$team(&(0x7f0000000380)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000780)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000007c0)={0x0, @dev, @remote}, &(0x7f0000000800)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in6=@local, @in=@dev}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a40)={{{@in=@multicast2, @in=@multicast2}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f0000000b40)=0xe8) accept(0xffffffffffffffff, &(0x7f0000000e80)=@can, &(0x7f0000000f00)=0x80) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000f40)={@ipv4={[], [], @local}}, &(0x7f0000000f80)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001080)={{{@in6=@local, @in=@remote}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001180)=0xe8) accept4(0xffffffffffffffff, &(0x7f00000011c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001240)=0x80, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000001280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000012c0)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001300)={{{@in=@multicast2, @in=@loopback}}, {{@in=@dev}}}, &(0x7f0000001400)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001440)={0x0, @dev, @multicast1}, &(0x7f0000001480)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000014c0)={@loopback, @multicast1}, &(0x7f0000001500)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001580)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001640)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000016c0)=0x10168, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000001700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001740)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001780)={{{@in6=@loopback, @in6=@loopback}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6}}, &(0x7f0000001880)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001b40)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001b80)={@broadcast, @multicast1}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001cc0)={0x0, @empty, @rand_addr}, &(0x7f0000001d00)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001d80)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001e80)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@multicast1}, 0x0, @in=@broadcast}}, &(0x7f0000001f80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001fc0)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002000)={@loopback, @loopback}, &(0x7f0000002040)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000002080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000020c0)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:34:05 executing program 1: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffff9c, 0x28, &(0x7f00000000c0)}, 0x10) add_key(&(0x7f0000000400)='dns_resolver\x00', &(0x7f0000000440), &(0x7f0000000980), 0x0, 0xfffffffffffffff8) lstat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)) lstat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)) keyctl$chown(0x4, 0x0, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180), 0xc) socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000200), 0x10) clock_gettime(0x0, &(0x7f0000000940)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe7}]}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'team0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000240), &(0x7f00000001c0)='GPL\x00', 0x0, 0x7, &(0x7f0000000300)=""/7}, 0x48) syz_execute_func(&(0x7f0000000040)="42805da0110fef69dc0fc201e5eeff0faa0faa37c4427d7838c8c19086d9f28fc9664f0f3a61780071c421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafedd7f") 03:34:05 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, &(0x7f0000000100)) accept$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000300)=0x14) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=0x4) mkdir(&(0x7f0000002880)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000200)={0x0, @broadcast, @remote}, &(0x7f00000002c0)=0xc) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000180), 0xc, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[]}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000480)={@ipv4={[], [], @multicast1}}) getpgrp(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001e80)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000001f80)=0xe8) getgroups(0x0, &(0x7f0000001fc0)) getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002000)={{{@in=@dev, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000002100)=0xe8) stat(&(0x7f0000002140)='./file2\x00', &(0x7f0000002180)) getpgid(0x0) getresuid(&(0x7f0000002200), &(0x7f0000002240), &(0x7f0000002280)) fstat(0xffffffffffffffff, &(0x7f00000022c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002340), &(0x7f0000002380)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000023c0)={{{@in=@local, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@mcast2}}, &(0x7f00000024c0)=0xe8) getegid() fcntl$getown(0xffffffffffffffff, 0x9) getuid() fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f0000002c80)='./file0\x00', &(0x7f0000002cc0)) getresgid(&(0x7f0000002d40), &(0x7f0000002d80), &(0x7f0000002dc0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002e00)) geteuid() getresgid(&(0x7f0000002e40), &(0x7f0000002e80), &(0x7f0000002ec0)) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000031c0), &(0x7f0000003200)=0xc) fstat(0xffffffffffffffff, &(0x7f0000003240)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000032c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003300)={{{@in6=@remote, @in6}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000003400)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003480)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000034c0)={{{@in=@local, @in=@dev}}, {{@in6=@local}, 0x0, @in=@rand_addr}}, &(0x7f00000035c0)=0xe8) stat(&(0x7f0000003600)='./file2\x00', &(0x7f0000003640)) lstat(&(0x7f00000036c0)='./file1/file0\x00', &(0x7f0000003700)) lstat(&(0x7f0000003780)='./file1\x00', &(0x7f00000037c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003840)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003880)={{{@in=@multicast2, @in6}}, {{@in=@rand_addr}, 0x0, @in=@multicast2}}, &(0x7f0000003980)=0xe8) getegid() ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000039c0)) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000280)="076595b13ede9c15c3e397cedaa31ebf", 0x10) socket$inet6_udp(0xa, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)="656d30e65b2d00"}, 0xffffffffffffff00) rename(&(0x7f0000000600)='./file0/file0\x00', &(0x7f0000000640)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440), &(0x7f00000004c0)=0xc) getuid() stat(&(0x7f0000004480)='./file2\x00', &(0x7f00000044c0)) 03:34:05 executing program 0: getrusage(0x0, &(0x7f0000000580)) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) mincore(&(0x7f0000fff000/0x1000)=nil, 0x1000, &(0x7f0000001680)=""/181) syz_open_procfs(0x0, &(0x7f0000000140)='cgroup\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000001800), 0x8) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) mount$fuseblk(&(0x7f0000000300)='/dev/loop0\x00', &(0x7f0000000340)='./file1\x00', &(0x7f0000000480)='fuseblk\x00', 0x0, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") openat$uhid(0xffffffffffffff9c, &(0x7f0000000500)='/dev/uhid\x00', 0x0, 0x0) ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) ioctl$KVM_ARM_SET_DEVICE_ADDR(0xffffffffffffffff, 0x4010aeab, &(0x7f00000002c0)) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000000480)) 03:34:05 executing program 2: syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000080)) sysfs$2(0x2, 0x0, &(0x7f0000000200)=""/47) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) mknod(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000780)="42805da0520fef84dc0f01eece67f3406e660c541af3f081768cc8000000df690067f00fbab204000000cac4e1057668d55cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 03:34:05 executing program 4: memfd_create(&(0x7f0000000080)="28402e00be1dbddfe9f600c3f992f8afcb2c7a10b39d47be00cf237690d95c1707691a6919a356db32b3ab2fb0cfd9ed244fa7a3d03809b6c1c859566c316499ad34c8d4f488ff08353ef1afdd5fac9e87043a62ab33a7b8ecbbb7bc4dcf414d103feb93fda6462317d4250c123cc0f9c08ecd", 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000240)) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000300)={@multicast1, @rand_addr}, 0x10) getegid() write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000140)={0x0, &(0x7f00000000c0)}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) chmod(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000002c0)) getpgid(0x0) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000180)=""/143) syz_execute_func(&(0x7f0000000540)="428055a02a6969ef69dc00d9e37d0fe1ff6920375137c339b52a8e0f38211adba564a70f97afbb00000040420fb0c7e5e5417545800f2e1a1a01460f01eec4e1472a77b0262e6426f30f2b05097402003f") [ 1022.325994] cgroup: fork rejected by pids controller in /syz1 03:34:05 executing program 3: keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket(0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000008c0)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, &(0x7f00000005c0)=0x98) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000980)={0x0, @in={{0x2, 0x0, @dev}}}, &(0x7f0000000a40)=0x98) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000001c0), 0x4) syz_open_dev$audion(&(0x7f0000000380)='/dev/audio#\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f00000003c0), 0x0) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") syz_open_dev$usb(&(0x7f0000000300)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f00000003c0)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000340)={0xffffffffffffffff, &(0x7f0000000240)}, 0x10) ioctl$VHOST_GET_VRING_ENDIAN(0xffffffffffffffff, 0x4008af14, &(0x7f0000000600)) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f00000000c0)='./file0\x00', 0x8, 0x0) eventfd(0x0) fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@known='security.evm\x00') setsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000640), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@multicast2, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000580)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getresgid(&(0x7f0000000740), &(0x7f0000000780), &(0x7f00000007c0)) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) getgroups(0x0, &(0x7f0000000bc0)) fstat(0xffffffffffffffff, &(0x7f0000000c00)) lstat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000000cc0)) 03:34:06 executing program 5: wait4(0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) 03:34:06 executing program 4: clock_gettime(0xfffffffffffffffd, &(0x7f0000000700)) umount2(&(0x7f0000000080)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f00000006c0)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f00000002c0)={"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"}) syz_execute_func(&(0x7f0000000240)="42805da00fef69dc0f01ee263a2086d40000c041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='statm\x00') ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) 03:34:06 executing program 0: syz_mount_image$minix(&(0x7f0000000040)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000006c0), 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) read(r2, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f00000003c0)={0xbf}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5334, &(0x7f0000000480)={0x0, 0x0, 0x0, "717565756531000000000000001f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000"}) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r3, 0x1000000000013) 03:34:06 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) migrate_pages(0x0, 0x20, &(0x7f0000000000)=0x2ae, &(0x7f0000000040)=0x221) 03:34:06 executing program 1: time(&(0x7f00000003c0)) mincore(&(0x7f0000ffd000/0x2000)=nil, 0x2000, &(0x7f0000000380)=""/165) clock_gettime(0x0, &(0x7f0000005980)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005700), 0x0, 0x0, &(0x7f00000059c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000005a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000005a40)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000240)="428055a061f36ee9d92a5c41ff0f1837370f38211ac4c4829bdd2520200fee0a9d9d2179fbe5f541754566470f71d600c48179fcdf26bc2ebc0d641e5dc4e1e0120db80000007f") seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) ioctl$KVM_GET_NR_MMU_PAGES(0xffffffffffffffff, 0xae45, 0x0) getegid() getgroups(0x0, &(0x7f0000000440)) stat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)) getgid() stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) getegid() fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0xc) getgroups(0x0, &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000000800)) getegid() getgroups(0x0, &(0x7f0000000880)) syz_execute_func(&(0x7f00000008c0)="42805da0690fef69dc6a6a01eece41ff0f183737c4c19086d9f28fc9410feefa6b2179f3acc4417c10fb410fdd300f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000340)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000980)={&(0x7f0000000280)='em1(mime_type!vboxnet0\x00', 0xffffffffffffff9c}, 0x10) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000300)) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000080)=0x1c, 0x0) [ 1023.417370] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop0. 03:34:06 executing program 4: clock_gettime(0x1, &(0x7f0000000200)) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) clock_settime(0x0, &(0x7f0000000040)={0x77359400}) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f0000000a40)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a80)={{{@in=@loopback, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000000b80)=0xe8) recvmmsg(0xffffffffffffff9c, &(0x7f00000021c0), 0x0, 0x0, &(0x7f0000002340)={0x77359400}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000035c0)={0x0, @remote, @multicast1}, &(0x7f0000003600)=0xc) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000003640)={@ipv4={[], [], @dev}}, &(0x7f0000003680)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000036c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000037c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003800)={{{@in6=@ipv4={[], [], @multicast1}, @in=@multicast2}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000003900)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003ac0)={@dev, @multicast1}, &(0x7f0000003b00)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000003b40)={{{@in=@remote, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000003c40)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003c80)={'bridge_slave_0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000003d40)={{{@in=@multicast1, @in=@broadcast}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000003e40)=0xe8) ioctl$sock_ifreq(0xffffffffffffff9c, 0x0, &(0x7f0000003e80)={'sit0\x00', @ifru_addrs=@hci}) accept4$packet(0xffffffffffffff9c, &(0x7f0000003ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000003f00)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003f40)={{{@in=@multicast1, @in6}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000004080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000040c0)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000004100)={@multicast2, @multicast1}, &(0x7f0000004140)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004200)={0x0, @multicast2}, &(0x7f0000004240)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004380)={{{@in6=@mcast2, @in=@multicast1}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000004480)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000044c0)={{{@in6=@ipv4={[], [], @remote}, @in=@local}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000045c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000004600)={@loopback}, &(0x7f0000004640)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000004680)={{{@in=@local, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000004780)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004ec0)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f0000004fc0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000005780)={&(0x7f00000001c0), 0xc, &(0x7f0000005740)={&(0x7f0000005000)={0x14}, 0x14}}, 0x0) syz_open_dev$rtc(&(0x7f0000000a00)='/dev/rtc#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 03:34:06 executing program 2: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x6, 0x8, &(0x7f0000001000)=ANY=[@ANYBLOB="bf160000000000006161000000000000616200000000000085100000010000009500000000000000bf1000000000000055000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, &(0x7f00000006c0)) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vga_arbiter\x00', 0x80000000080, 0x0) pipe2(&(0x7f0000000680), 0x84800) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0}, 0xa0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000380)='/dev/hwrng\x00', 0x0, 0x0) open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) msgget$private(0x0, 0x0) 03:33:20 executing program 2: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x6, 0x8, &(0x7f0000001000)=ANY=[@ANYBLOB="bf160000000000006161000000000000616200000000000085100000010000009500000000000000bf1000000000000055000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, &(0x7f00000006c0)) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vga_arbiter\x00', 0x80000000080, 0x0) pipe2(&(0x7f0000000680), 0x84800) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0}, 0xa0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000380)='/dev/hwrng\x00', 0x0, 0x0) open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) msgget$private(0x0, 0x0) 03:33:20 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x6, 0x8, &(0x7f0000001000)=ANY=[@ANYBLOB="bf160000000000006161000000000000616200000000000085100000010000009500000000000000bf1000000000000055000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, &(0x7f00000006c0)) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vga_arbiter\x00', 0x80000000080, 0x0) pipe2(&(0x7f0000000680), 0x84800) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0}, 0xa0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000380)='/dev/hwrng\x00', 0x0, 0x0) open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) msgget$private(0x0, 0x0) 03:33:20 executing program 2: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x6, 0x8, &(0x7f0000001000)=ANY=[@ANYBLOB="bf160000000000006161000000000000616200000000000085100000010000009500000000000000bf1000000000000055000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, &(0x7f00000006c0)) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vga_arbiter\x00', 0x80000000080, 0x0) pipe2(&(0x7f0000000680), 0x84800) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0}, 0xa0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000380)='/dev/hwrng\x00', 0x0, 0x0) open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) msgget$private(0x0, 0x0) 03:33:20 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x6, 0x8, &(0x7f0000001000)=ANY=[@ANYBLOB="bf160000000000006161000000000000616200000000000085100000010000009500000000000000bf1000000000000055000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, &(0x7f00000006c0)) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vga_arbiter\x00', 0x80000000080, 0x0) pipe2(&(0x7f0000000680), 0x84800) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0}, 0xa0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000380)='/dev/hwrng\x00', 0x0, 0x0) open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) msgget$private(0x0, 0x0) 03:33:20 executing program 2: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x6, 0x8, &(0x7f0000001000)=ANY=[@ANYBLOB="bf160000000000006161000000000000616200000000000085100000010000009500000000000000bf1000000000000055000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, &(0x7f00000006c0)) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vga_arbiter\x00', 0x80000000080, 0x0) pipe2(&(0x7f0000000680), 0x84800) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0}, 0xa0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000380)='/dev/hwrng\x00', 0x0, 0x0) open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) msgget$private(0x0, 0x0) 03:33:20 executing program 5: futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000240)='net/unix\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'veth0_to_team\x00'}) socket$key(0xf, 0x3, 0x2) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000880)="428055a0dec48159dc9bfc00000000d990c841ff0f1837370f38211ac19086d9f28fc9410feefa4e2179fbe5e5417545180f2e1a1a010d64ac1e5d31a3b786e2989f7f") [ 1024.182878] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop0. 03:33:20 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x6, 0x8, &(0x7f0000001000)=ANY=[@ANYBLOB="bf160000000000006161000000000000616200000000000085100000010000009500000000000000bf1000000000000055000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, &(0x7f00000006c0)) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vga_arbiter\x00', 0x80000000080, 0x0) pipe2(&(0x7f0000000680), 0x84800) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0}, 0xa0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000380)='/dev/hwrng\x00', 0x0, 0x0) open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) msgget$private(0x0, 0x0) 03:33:20 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f000000cff8)='./file0\x00', 0x80040, 0x0) mount(&(0x7f0000691ff2), &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='nfs4\x00', 0x0, &(0x7f0000dedf2f)='v4') 03:33:20 executing program 0: setpriority(0x1, 0x0, 0x0) open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_all\x00', 0x0, 0x0) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, &(0x7f0000000300)) syz_emit_ethernet(0x0, &(0x7f0000000380)=ANY=[], 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)={@remote, @local}, &(0x7f0000000700)=0xc) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x2cc) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da0124fefeddc0f01eea873fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 03:33:20 executing program 1: getpid() timer_create(0x0, &(0x7f0000000380), &(0x7f0000000200)) timer_getoverrun(0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x0, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @local}, &(0x7f00000002c0)=0x1c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") ustat(0x0, &(0x7f0000000340)) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:33:20 executing program 4: clock_gettime(0x1, &(0x7f0000000200)) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) clock_settime(0x0, &(0x7f0000000040)={0x77359400}) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f0000000a40)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a80)={{{@in=@loopback, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000000b80)=0xe8) recvmmsg(0xffffffffffffff9c, &(0x7f00000021c0), 0x0, 0x0, &(0x7f0000002340)={0x77359400}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000035c0)={0x0, @remote, @multicast1}, &(0x7f0000003600)=0xc) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000003640)={@ipv4={[], [], @dev}}, &(0x7f0000003680)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000036c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000037c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003800)={{{@in6=@ipv4={[], [], @multicast1}, @in=@multicast2}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000003900)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003ac0)={@dev, @multicast1}, &(0x7f0000003b00)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000003b40)={{{@in=@remote, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000003c40)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003c80)={'bridge_slave_0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000003d40)={{{@in=@multicast1, @in=@broadcast}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000003e40)=0xe8) ioctl$sock_ifreq(0xffffffffffffff9c, 0x0, &(0x7f0000003e80)={'sit0\x00', @ifru_addrs=@hci}) accept4$packet(0xffffffffffffff9c, &(0x7f0000003ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000003f00)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003f40)={{{@in=@multicast1, @in6}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000004080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000040c0)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000004100)={@multicast2, @multicast1}, &(0x7f0000004140)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004200)={0x0, @multicast2}, &(0x7f0000004240)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004380)={{{@in6=@mcast2, @in=@multicast1}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000004480)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000044c0)={{{@in6=@ipv4={[], [], @remote}, @in=@local}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000045c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000004600)={@loopback}, &(0x7f0000004640)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000004680)={{{@in=@local, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000004780)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004ec0)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f0000004fc0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000005780)={&(0x7f00000001c0), 0xc, &(0x7f0000005740)={&(0x7f0000005000)={0x14}, 0x14}}, 0x0) syz_open_dev$rtc(&(0x7f0000000a00)='/dev/rtc#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 03:33:20 executing program 2: sysfs$2(0x2, 0x0, &(0x7f0000000380)=""/163) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000080)) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000580)) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f00000001c0)) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000780)) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, &(0x7f00000000c0)) bind(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80) getpid() ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000600)) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f00000007c0)=""/115) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000280)={&(0x7f0000ffa000/0x4000)=nil, 0x4000}, &(0x7f0000000740)=0x10) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000880)=""/4096, &(0x7f0000000040)=0x1000) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in={{0x2, 0x0, @rand_addr}}}, &(0x7f0000000140)=0x90) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000001880)=ANY=[], &(0x7f0000000240)) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, &(0x7f0000000600)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', &(0x7f0000000240)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") 03:33:20 executing program 3: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000580)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000ec0)='/dev/rtc0\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000f00)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000140)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in=@rand_addr, @in6=@dev}}, {{@in=@rand_addr}, 0x0, @in6=@local}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000007c0)={{{@in=@rand_addr, @in=@broadcast}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000340)=0xe8) openat$ppp(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000980)={{{@in, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) getresuid(&(0x7f0000000400), &(0x7f0000000600), &(0x7f0000000640)) getegid() getegid() fstat(0xffffffffffffffff, &(0x7f00000008c0)) getresgid(&(0x7f00000006c0), &(0x7f0000000a80), &(0x7f0000000ac0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b80), &(0x7f0000000b40)=0xc) syz_open_dev$evdev(&(0x7f0000000e00)='/dev/input/event#\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000e40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c00), &(0x7f0000000c40)=0xc) lstat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000000cc0)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f0000000d40)=ANY=[], 0x0, 0x0) lremovexattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)=ANY=[]) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) lremovexattr(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)=ANY=[]) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000540)) accept$inet(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @remote}, &(0x7f0000000280)=0x10) socket$unix(0x1, 0x0, 0x0) accept4$inet(0xffffffffffffff9c, &(0x7f00000003c0)={0x2, 0x0, @multicast2}, &(0x7f0000000680)=0x10, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000700)='/dev/rtc0\x00', 0x0, 0x0) accept(0xffffffffffffffff, &(0x7f0000000280)=@pppoe={0x18, 0x0, {0x0, @remote}}, &(0x7f0000000040)=0x80) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000500)=ANY=[], &(0x7f0000000dc0)) getrandom(&(0x7f0000000700)=""/148, 0x94, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uinput\x00', 0x0, 0x0) get_thread_area(&(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="428055a0fffafa292b29f4e684e68400d9ce41c4ff0f0f37370f38211a440f00e13e3e660fd8ba00000000410feef24e2179fbe5e50fe7250050ddca0f2e1a2e46d1489d064ae2989f") setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000002c0), 0x4) getgid() gettid() socket$key(0xf, 0x3, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000d40)) 03:33:20 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f00000001c0)=@sr0='/dev/sr0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='coda\x00', 0x20000, &(0x7f0000000380)='cramfs\x00') mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='cramfs\x00', 0x11002, &(0x7f0000000100)="760001b076") 03:33:20 executing program 1: keyctl$set_reqkey_keyring(0x4, 0x0) pipe(&(0x7f0000000500)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f00000004c0)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000001000)) getgid() getpid() getresuid(&(0x7f0000000580), &(0x7f00000003c0), &(0x7f00000005c0)) getgroups(0x40cb, &(0x7f0000000140)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001180), &(0x7f00000011c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001280)={{{@in6=@mcast2, @in6=@remote}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000001380)=0xe8) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003080)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000003040)='--)selinuxselinux\x00'}, 0x30) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f0000003140)) getgroups(0x40000282, &(0x7f0000003180)) gettid() stat(&(0x7f00000031c0)='./file0\x00', &(0x7f0000003200)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003280)) fstat(0xffffffffffffffff, &(0x7f0000003380)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000048c0)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004880)='keyring\x00'}, 0x30) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000600)="428055a0a269d069ef69dc05d9c457fdeeee817565714c0f0f5bcd0843f643f60f38f6f365060c00e02bc441f97e8a000000006471400f01ef7d0ff34e0f2d4f6fec76ec1a72010f166300059f") 03:33:20 executing program 5: prctl$intptr(0x400059616d61, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000500)={0x8}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000003c0)=ANY=[]) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:33:20 executing program 2: msgget(0x1, 0x0) pipe2(&(0x7f0000000040), 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x0, 0x0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000580)) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) syz_execute_func(&(0x7f0000000080)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 03:33:20 executing program 0: prctl$setmm(0x23, 0x7, &(0x7f0000ff9000/0x4000)=nil) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}, 0x10) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000001c0), &(0x7f0000000280)=0x4) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f00000000c0), &(0x7f0000000040)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getpid() timerfd_create(0x0, 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000240)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000180)) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f00000003c0), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000005c0), 0xc) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000002c0), &(0x7f0000000340)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000480), &(0x7f0000000380)=0x98) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a00bb4c4c9086d9f28fc9410feefae5e54175455d0f2e1a1a01c4e2119c880000008031a3b786e2989f7f") 03:33:20 executing program 4: clock_gettime(0x1, &(0x7f0000000200)) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) clock_settime(0x0, &(0x7f0000000040)={0x77359400}) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f0000000a40)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a80)={{{@in=@loopback, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000000b80)=0xe8) recvmmsg(0xffffffffffffff9c, &(0x7f00000021c0), 0x0, 0x0, &(0x7f0000002340)={0x77359400}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000035c0)={0x0, @remote, @multicast1}, &(0x7f0000003600)=0xc) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000003640)={@ipv4={[], [], @dev}}, &(0x7f0000003680)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000036c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000037c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003800)={{{@in6=@ipv4={[], [], @multicast1}, @in=@multicast2}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000003900)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003ac0)={@dev, @multicast1}, &(0x7f0000003b00)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000003b40)={{{@in=@remote, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000003c40)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003c80)={'bridge_slave_0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000003d40)={{{@in=@multicast1, @in=@broadcast}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000003e40)=0xe8) ioctl$sock_ifreq(0xffffffffffffff9c, 0x0, &(0x7f0000003e80)={'sit0\x00', @ifru_addrs=@hci}) accept4$packet(0xffffffffffffff9c, &(0x7f0000003ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000003f00)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003f40)={{{@in=@multicast1, @in6}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000004080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000040c0)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000004100)={@multicast2, @multicast1}, &(0x7f0000004140)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004200)={0x0, @multicast2}, &(0x7f0000004240)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004380)={{{@in6=@mcast2, @in=@multicast1}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000004480)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000044c0)={{{@in6=@ipv4={[], [], @remote}, @in=@local}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000045c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000004600)={@loopback}, &(0x7f0000004640)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000004680)={{{@in=@local, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000004780)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004ec0)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f0000004fc0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000005780)={&(0x7f00000001c0), 0xc, &(0x7f0000005740)={&(0x7f0000005000)={0x14}, 0x14}}, 0x0) syz_open_dev$rtc(&(0x7f0000000a00)='/dev/rtc#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 03:33:20 executing program 3: keyctl$set_reqkey_keyring(0x7, 0xfffffffc) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 03:33:20 executing program 3: modify_ldt$read_default(0x2, &(0x7f0000000400)=""/248, 0xf8) futex(&(0x7f0000000280), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000000c0), 0x0) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000640)=ANY=[], 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000640)={'syz0'}, 0x4) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000000)) writev(0xffffffffffffffff, &(0x7f0000000400), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000200)) rt_sigtimedwait(&(0x7f0000000540), &(0x7f0000000500), &(0x7f0000000140)={0x0, 0x989680}, 0xf096fce865f00b85) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000340)=""/224) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f00000001c0)) mlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000600)={0x0, 0x1c9c380}, 0x8) syz_genetlink_get_family_id$team(&(0x7f00000006c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000700)={@broadcast, @multicast1}, &(0x7f0000000740)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000780)={0x0, @remote, @loopback}, &(0x7f00000007c0)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000840)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000880)={{{@in=@rand_addr, @in=@multicast1}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@dev}}, &(0x7f0000000980)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000a00)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000a40)={0x0, @multicast2, @loopback}, &(0x7f0000000a80)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000000ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000b00)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000000b40)=@xdp, &(0x7f0000000bc0)=0x80) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'team0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000c80)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in=@loopback, @in=@multicast1}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000000e00)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000e40)={'syzkaller0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000f40), &(0x7f0000000f80)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001000)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001100)={'gretap0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001400)={0x0, @rand_addr, @rand_addr}, &(0x7f0000001440)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000001480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000014c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001500)={{{@in6, @in6=@ipv4={[], [], @loopback}}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000001600)=0xe8) accept4(0xffffffffffffffff, &(0x7f0000003840)=@xdp, &(0x7f00000038c0)=0x80, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003f80)={&(0x7f0000000680), 0xc, &(0x7f0000003f40)={&(0x7f0000003900)={0x14}, 0x14}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:20 executing program 1: keyctl$set_reqkey_keyring(0x2, 0xfffffffffffffffe) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) socket$nl_route(0x10, 0x3, 0x0) msgget$private(0x0, 0x0) openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x0, 0x0) ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), 0x4) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000240)=""/83) semget$private(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000017c0)={{0x0, @empty, 0x0, 0x0, 'lc\x00'}, {@broadcast}}, 0x44) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) ftruncate(0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000180), 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000540)={&(0x7f0000000400)='./file0\x00'}, 0x10) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:33:20 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x199, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)="2f6465762f6e65742f74756eff", 0x241, 0x0) write$cgroup_type(r0, &(0x7f0000000040)='threaded\x00', 0x0) 03:33:20 executing program 5: accept$alg(0xffffffffffffff9c, 0x0, 0x0) eventfd(0x0) signalfd(0xffffffffffffffff, &(0x7f0000000080), 0x2a5) pwritev(0xffffffffffffffff, &(0x7f00000007c0), 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000040)='-$\x00', 0xffffffffffffff9c}, 0x10) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000140)={0x14}, 0xfffffffffffffe9a) munmap(&(0x7f0000005000/0x3000)=nil, 0x3000) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U+'}, 0x28, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000009c0)) stat(&(0x7f0000000a00)='./bus\x00', &(0x7f0000000a40)) stat(&(0x7f0000000ac0)='./bus\x00', &(0x7f0000000b00)) gettid() getresuid(&(0x7f0000000e40), &(0x7f0000000e80), &(0x7f0000000ec0)) getgroups(0x0, &(0x7f0000000f00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000f80)={{{@in6=@dev, @in6=@mcast1}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000001080)=0xe8) getpgid(0xffffffffffffffff) getresuid(&(0x7f00000013c0), &(0x7f0000001400), &(0x7f0000001440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getpgrp(0xffffffffffffffff) getuid() stat(&(0x7f0000001500)='./bus\x00', &(0x7f0000001540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) lstat(&(0x7f0000001640)='./bus\x00', &(0x7f0000001680)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001700)) getuid() fstat(0xffffffffffffffff, &(0x7f0000001740)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000017c0)) getuid() lstat(&(0x7f0000001800)='./bus\x00', &(0x7f0000001840)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001b40), &(0x7f0000001b80)=0xc) stat(&(0x7f0000001bc0)='./bus\x00', &(0x7f0000001c00)) getresuid(&(0x7f0000001d00), &(0x7f0000001d40), &(0x7f0000001d80)) lstat(&(0x7f0000001dc0)='./bus\x00', &(0x7f0000001e00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001ec0)={{{@in6=@dev, @in=@dev}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000001fc0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002000), &(0x7f0000002040)=0xc) gettid() fstat(0xffffffffffffffff, &(0x7f0000000280)) getegid() getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002a80)={{{@in6=@ipv4={[], [], @local}}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002b80)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000380)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003040), &(0x7f0000003080)=0xc) lstat(&(0x7f00000030c0)='./bus\x00', &(0x7f0000003100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:33:20 executing program 2: unshare(0x10000003) syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000140)) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000040), &(0x7f0000000280)=0x14) unshare(0x0) syz_open_procfs(0x0, &(0x7f0000000400)="6e657447c44d7afa2ca41a742f69765f696e65743600") socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000280)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f00000002c0)) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)) capset(&(0x7f0000000340), &(0x7f0000000440)) syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') getsockname(0xffffffffffffffff, &(0x7f0000002100)=@hci, &(0x7f0000002180)=0x80) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000021c0)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f00000022c0)=0x24) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002300)={{{@in6=@dev, @in=@remote}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f0000002400)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000002500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002540)=0x14) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000300)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002580)={{{@in6=@mcast2}}, {{@in=@loopback}, 0x0, @in=@dev}}, &(0x7f0000002680)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000026c0)={{{@in=@local, @in6=@loopback}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@dev}}, &(0x7f00000027c0)=0xe8) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10, 0x0) clock_gettime(0x0, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f14157a9e3e643e66f26fe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") setsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000002c0), 0x8) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000780)={{{@in6=@loopback, @in6=@ipv4={[], [], @multicast1}}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000880)=0xe8) 03:33:20 executing program 4: clock_gettime(0x1, &(0x7f0000000200)) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) clock_settime(0x0, &(0x7f0000000040)={0x77359400}) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f0000000a40)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a80)={{{@in=@loopback, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000000b80)=0xe8) recvmmsg(0xffffffffffffff9c, &(0x7f00000021c0), 0x0, 0x0, &(0x7f0000002340)={0x77359400}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000035c0)={0x0, @remote, @multicast1}, &(0x7f0000003600)=0xc) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000003640)={@ipv4={[], [], @dev}}, &(0x7f0000003680)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000036c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000037c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003800)={{{@in6=@ipv4={[], [], @multicast1}, @in=@multicast2}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000003900)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003ac0)={@dev, @multicast1}, &(0x7f0000003b00)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000003b40)={{{@in=@remote, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000003c40)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003c80)={'bridge_slave_0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000003d40)={{{@in=@multicast1, @in=@broadcast}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000003e40)=0xe8) ioctl$sock_ifreq(0xffffffffffffff9c, 0x0, &(0x7f0000003e80)={'sit0\x00', @ifru_addrs=@hci}) accept4$packet(0xffffffffffffff9c, &(0x7f0000003ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000003f00)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003f40)={{{@in=@multicast1, @in6}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000004080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000040c0)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000004100)={@multicast2, @multicast1}, &(0x7f0000004140)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004200)={0x0, @multicast2}, &(0x7f0000004240)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004380)={{{@in6=@mcast2, @in=@multicast1}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000004480)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000044c0)={{{@in6=@ipv4={[], [], @remote}, @in=@local}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000045c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000004600)={@loopback}, &(0x7f0000004640)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000004680)={{{@in=@local, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000004780)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004ec0)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f0000004fc0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000005780)={&(0x7f00000001c0), 0xc, &(0x7f0000005740)={&(0x7f0000005000)={0x14}, 0x14}}, 0x0) syz_open_dev$rtc(&(0x7f0000000a00)='/dev/rtc#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 03:33:20 executing program 0: shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0xfffffffffffffffe) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[], 0x0) clock_settime(0x0, &(0x7f00000000c0)={0x77359400}) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) write$P9_RFLUSH(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) clock_nanosleep(0x0, 0x0, &(0x7f00000004c0), &(0x7f00000002c0)) timerfd_create(0x0, 0x0) set_tid_address(&(0x7f00000001c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) socket$inet_icmp_raw(0x2, 0x3, 0x1) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) setpriority(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000340)) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000380)) openat(0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x0, 0x0) 03:33:20 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha384\x00'}, 0x58) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) r2 = accept$alg(r0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x5, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 03:33:20 executing program 3: clock_nanosleep(0x0, 0x0, &(0x7f0000000140), 0xfffffffffffffffd) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000003600)) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@mcast1, @in6=@local}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f00000002c0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'dummy0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000014c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@remote, @multicast1}, &(0x7f0000001540)=0xc) getsockname$packet(0xffffffffffffff9c, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000015c0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000001600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001640)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000016c0)={'team0\x00'}) accept$packet(0xffffffffffffff9c, &(0x7f0000001800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001840)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001940)={{{@in6, @in6}}, {{@in=@multicast1}, 0x0, @in=@broadcast}}, &(0x7f0000001a40)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001a80)={{{@in=@dev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f0000001b80)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f00000020c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002100)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002180)={@rand_addr, @broadcast}, &(0x7f00000021c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002200)={{{@in=@multicast1, @in6=@dev}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000002300)=0xe8) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000004fc0)={@multicast1, @dev}, &(0x7f0000005000)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000005040)={{{@in=@multicast1, @in=@local}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000005140)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005200)={{{@in, @in=@dev}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f0000005300)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005480)={{{@in6, @in6=@dev}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000005580)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f00000055c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005600)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000005700), &(0x7f0000005740)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f0000005780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000057c0)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005800)={{{@in=@multicast1, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000005900)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f0000005940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000005980)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000059c0)={@multicast1, @dev}, &(0x7f0000005a00)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005a40)={0x0, @loopback, @broadcast}, &(0x7f0000005a80)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000005ac0)={@dev}, &(0x7f0000005b00)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005c00)={{{@in=@remote, @in6=@mcast1}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000005d00)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000006d80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000006dc0)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000009880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000098c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000009900)={{{@in6=@mcast2, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f0000009a00)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f000000b400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000b440)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000b480)={{{@in=@dev, @in6=@mcast2}}, {{@in6}, 0x0, @in6=@dev}}, &(0x7f000000b580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000b880)={{{@in6, @in=@multicast2}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f000000b980)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000bb00)={{{@in6, @in=@multicast2}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f000000bc00)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f000000cdc0), 0x0, 0x0, &(0x7f000000cf40)={0x77359400}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000d540)={{{@in=@multicast2, @in=@local}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f000000d640)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000d680)={@mcast1}, &(0x7f000000d6c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f000000e3c0)={&(0x7f00000000c0), 0xc, &(0x7f000000e380)={&(0x7f000000d700)=ANY=[]}}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000003640)=""/135, &(0x7f0000003580)=0x87) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) socket$unix(0x1, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="428055a0fffafa292b29f4e684e68400d9ce41c4ff0f0f3737440f00e13e3e660fd8ba00000000410feef24e2179fbe5e50fe7250050ddca0f2e1a2e46d1489d064ae2989f") 03:33:20 executing program 1: mknod(&(0x7f0000000ffa)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000db4000), 0xc, &(0x7f00006bcff0)={&(0x7f000075b000)=@ipv6_newroute={0x30, 0x18, 0x301, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x8, 0x15, 0x7}, @RTA_ENCAP={0xc, 0x16, @nested={0x8, 0x1, [@generic='\a']}}]}, 0x30}}, 0x0) [ 1027.383905] netlink: 'syz-executor1': attribute type 21 has an invalid length. [ 1027.441622] netlink: 'syz-executor1': attribute type 21 has an invalid length. 03:33:20 executing program 2: prctl$setname(0x3, &(0x7f00000000c0)='/dev/full\x00') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='cpuacct.usage_sys\x00', 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f00000000c0), 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f0000000200)=ANY=[]) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000840)=""/66, &(0x7f00000008c0)=0x42) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000200)={0x0, @aes256}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f0000000280), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:20 executing program 5: keyctl$set_reqkey_keyring(0xf, 0xfffffffe) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) geteuid() clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000240)}) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000380)}) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffd000/0x1000)=nil) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)) shmctl$IPC_SET(0x0, 0x1, &(0x7f00000007c0)) getpid() getpgid(0x0) gettid() accept(0xffffffffffffffff, &(0x7f0000000640)=@in6={0xa, 0x0, 0x0, @remote}, &(0x7f00000006c0)=0x80) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getpid() getpgrp(0x0) getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000280)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000300)) getpgid(0x0) creat(&(0x7f0000000780)='./file1\x00', 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000500), &(0x7f0000000600)=0xc) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000340), 0xc, &(0x7f0000000400)={&(0x7f0000000580)=ANY=[]}}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='pids.events\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000004c0)="8f8757ab687ebd0e1ba5b58d5b3fa0e7", 0x10) 03:33:20 executing program 4: keyctl$set_reqkey_keyring(0x16, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000280), &(0x7f00000002c0)=0x4) ioctl$KVM_UNREGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae68, &(0x7f0000000300)) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000004c0)={0x0, 0x7530}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) arch_prctl(0x0, &(0x7f0000000480)) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000440)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100), 0x28) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:33:20 executing program 1: mknod(&(0x7f0000000ffa)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000db4000), 0xc, &(0x7f00006bcff0)={&(0x7f000075b000)=@ipv6_newroute={0x30, 0x18, 0x301, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x8, 0x15, 0x7}, @RTA_ENCAP={0xc, 0x16, @nested={0x8, 0x1, [@generic='\a']}}]}, 0x30}}, 0x0) [ 1027.674059] netlink: 'syz-executor1': attribute type 21 has an invalid length. 03:33:20 executing program 1: mknod(&(0x7f0000000ffa)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000db4000), 0xc, &(0x7f00006bcff0)={&(0x7f000075b000)=@ipv6_newroute={0x30, 0x18, 0x301, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x8, 0x15, 0x7}, @RTA_ENCAP={0xc, 0x16, @nested={0x8, 0x1, [@generic='\a']}}]}, 0x30}}, 0x0) 03:33:20 executing program 0: shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0xfffffffffffffffe) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[], 0x0) clock_settime(0x0, &(0x7f00000000c0)={0x77359400}) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) write$P9_RFLUSH(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) clock_nanosleep(0x0, 0x0, &(0x7f00000004c0), &(0x7f00000002c0)) timerfd_create(0x0, 0x0) set_tid_address(&(0x7f00000001c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) socket$inet_icmp_raw(0x2, 0x3, 0x1) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) setpriority(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000340)) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000380)) openat(0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x0, 0x0) [ 1027.892851] netlink: 'syz-executor1': attribute type 21 has an invalid length. 03:33:20 executing program 1: mknod(&(0x7f0000000ffa)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000db4000), 0xc, &(0x7f00006bcff0)={&(0x7f000075b000)=@ipv6_newroute={0x30, 0x18, 0x301, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x8, 0x15, 0x7}, @RTA_ENCAP={0xc, 0x16, @nested={0x8, 0x1, [@generic='\a']}}]}, 0x30}}, 0x0) [ 1028.115601] netlink: 'syz-executor1': attribute type 21 has an invalid length. 03:33:20 executing program 1: timerfd_create(0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') preadv(0xffffffffffffffff, &(0x7f0000000680), 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@mcast1, @in=@local}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in=@multicast2}}, &(0x7f00000006c0)=0xe8) lsetxattr$trusted_overlay_redirect(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x0) init_module(&(0x7f0000000040)='&keyring\x00', 0x9, &(0x7f00000000c0)="2918656d3025657468306367726f757024406d696d655f747970655b47504c6d643573756d2321656d31766d6e6574312e00") syz_open_dev$amidi(&(0x7f00000003c0)='/dev/amidi#\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)}, &(0x7f00000004c0)=0x10) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000500), &(0x7f0000000540)=0x8) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000400)) clock_getres(0x0, &(0x7f00000001c0)) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f00000002c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000380)) ustat(0x0, &(0x7f0000000140)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000300), 0x0) geteuid() accept$nfc_llcp(0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000280)=0x60) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000080)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f21efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:20 executing program 3: syz_open_procfs$namespace(0x0, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') sysinfo(&(0x7f0000000840)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x0, 0x0) getresgid(&(0x7f0000000140), &(0x7f00000001c0), &(0x7f0000000200)) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000280), 0x4) getpid() wait4(0x0, &(0x7f0000000080), 0x0, &(0x7f0000000300)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000001500)) pipe2(&(0x7f0000000080), 0x0) ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") epoll_create(0x0) gettid() set_tid_address(&(0x7f0000000440)) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f175000c4227d19decb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 03:33:20 executing program 3: seccomp(0x2, 0x0, &(0x7f0000000100)) msgget$private(0x0, 0x0) io_setup(0x0, &(0x7f0000000040)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f00000001c0)='{\x00', 0xffffffffffffff9c}, 0x10) ioctl$SG_SET_FORCE_PACK_ID(0xffffffffffffffff, 0x227b, &(0x7f0000000280)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000500)={{{@in6=@ipv4={[], [], @remote}, @in6=@loopback}}, {{@in=@loopback}, 0x0, @in6=@ipv4}}, &(0x7f0000000200)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:33:20 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) 03:33:20 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x7, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000780), 0xffffffffffffffee, &(0x7f0000000880)={&(0x7f0000000080)=ANY=[@ANYRESOCT], 0x1}}, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) writev(r2, &(0x7f0000000700), 0x1000000000000110) fcntl$getown(r2, 0x9) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x7, 0x1, 0x56a5, 0x0, 0x0, 0x9d53, 0x40020, 0x1, 0x0, 0x5, 0x1000, 0xffffffffffffffff, 0x8b, 0x4, 0x2, 0x8001, 0x0, 0x5, 0x4, 0x0, 0xffffffff00000000, 0x0, 0x0, 0x6, 0x2, 0x6, 0x100, 0xfffffffffffffffb, 0x10001, 0x0, 0x8, 0x3f8000000000, 0x58e, 0x3, 0x4, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x9, 0xffffffff7fffffff}, 0x4001, 0x6, 0x0, 0x7, 0x400, 0x9, 0x23}, 0x0, 0xc, r0, 0x8) 03:33:20 executing program 2: setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000001c0)=0x3ce, 0x4) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000140)) fcntl$lock(r0, 0x26, &(0x7f0000000040)={0x0, 0x0, 0xffffffffffffffff}) 03:33:21 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_emit_ethernet(0x3e, &(0x7f0000000040)={@random="252e47256f1c", @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x8, 0xf, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev}}}}}}, &(0x7f0000000000)) 03:33:21 executing program 2: clock_gettime(0x2, &(0x7f0000000040)) recvmmsg(0xffffffffffffffff, &(0x7f0000000d40), 0x0, 0x0, &(0x7f0000000bc0)) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0), 0x4) accept$inet6(0xffffffffffffff9c, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local}, &(0x7f0000000340)=0x1c) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000380), 0x4) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') accept4$packet(0xffffffffffffff9c, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000d00)=0x14, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000fc0)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000010c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001100)={0x0, @empty, @loopback}, &(0x7f0000001140)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000011c0)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f0000001280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000012c0)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001300)={0x0, @local, @rand_addr}, &(0x7f0000001340)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004040)={{{@in6=@mcast2, @in=@loopback}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000004140)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000004280)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f000000af00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000af40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000b080)={{{@in6=@loopback, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, &(0x7f000000b180)=0xe8) accept(0xffffffffffffffff, &(0x7f000000b280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000b300)=0x80) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000b340)={@multicast2, @local}, &(0x7f000000b380)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000b3c0)={{{@in=@multicast2, @in=@multicast1}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f000000b4c0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000b5c0)={'ip_vti0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f000000b600)={{{@in6, @in6=@remote}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f000000b700)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000b780)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f000000b900)={{{@in=@rand_addr, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@loopback}}, &(0x7f000000ba00)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000ba80)={'bridge_slave_1\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000bac0)={{{@in=@multicast2, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f000000bbc0)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f000000bc00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000bc40)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000bf80)={@loopback}, &(0x7f000000bfc0)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000c000)={{{@in=@loopback, @in=@loopback}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f000000c100)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f000000c140)={0x0, @local, @local}, &(0x7f000000c180)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f000000c280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 03:33:21 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x80000000000006) setsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f0000000200)=0x1000, 0x4) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0x8}}, 0x1c) 03:33:21 executing program 0: shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0xfffffffffffffffe) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[], 0x0) clock_settime(0x0, &(0x7f00000000c0)={0x77359400}) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) write$P9_RFLUSH(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) clock_nanosleep(0x0, 0x0, &(0x7f00000004c0), &(0x7f00000002c0)) timerfd_create(0x0, 0x0) set_tid_address(&(0x7f00000001c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) socket$inet_icmp_raw(0x2, 0x3, 0x1) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) setpriority(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000340)) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000380)) openat(0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x0, 0x0) 03:33:21 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x7, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000780), 0xffffffffffffffee, &(0x7f0000000880)={&(0x7f0000000080)=ANY=[@ANYRESOCT], 0x1}}, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) writev(r2, &(0x7f0000000700), 0x1000000000000110) fcntl$getown(r2, 0x9) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x7, 0x1, 0x56a5, 0x0, 0x0, 0x9d53, 0x40020, 0x1, 0x0, 0x5, 0x1000, 0xffffffffffffffff, 0x8b, 0x4, 0x2, 0x8001, 0x0, 0x5, 0x4, 0x0, 0xffffffff00000000, 0x0, 0x0, 0x6, 0x2, 0x6, 0x100, 0xfffffffffffffffb, 0x10001, 0x0, 0x8, 0x3f8000000000, 0x58e, 0x3, 0x4, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x9, 0xffffffff7fffffff}, 0x4001, 0x6, 0x0, 0x7, 0x400, 0x9, 0x23}, 0x0, 0xc, r0, 0x8) 03:33:21 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x7, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000780), 0xffffffffffffffee, &(0x7f0000000880)={&(0x7f0000000080)=ANY=[@ANYRESOCT], 0x1}}, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) writev(r2, &(0x7f0000000700), 0x1000000000000110) fcntl$getown(r2, 0x9) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x7, 0x1, 0x56a5, 0x0, 0x0, 0x9d53, 0x40020, 0x1, 0x0, 0x5, 0x1000, 0xffffffffffffffff, 0x8b, 0x4, 0x2, 0x8001, 0x0, 0x5, 0x4, 0x0, 0xffffffff00000000, 0x0, 0x0, 0x6, 0x2, 0x6, 0x100, 0xfffffffffffffffb, 0x10001, 0x0, 0x8, 0x3f8000000000, 0x58e, 0x3, 0x4, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x9, 0xffffffff7fffffff}, 0x4001, 0x6, 0x0, 0x7, 0x400, 0x9, 0x23}, 0x0, 0xc, r0, 0x8) 03:33:20 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_emit_ethernet(0x3e, &(0x7f0000000040)={@random="252e47256f1c", @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x8, 0xf, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev}}}}}}, &(0x7f0000000000)) 03:33:20 executing program 1: mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000180)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)) getpgrp(0x0) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000240)) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000200)) openat$cgroup_procs(0xffffffffffffff9c, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) accept(0xffffffffffffffff, &(0x7f0000000500), &(0x7f0000000040)=0x80) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'bridge_slave_1\x00'}, 0xffffffffffffff00) syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@multicast1, @in=@multicast1}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000000700)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000400)=0xfffffe12) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'yam0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f00000008c0), &(0x7f0000000900)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000940)={{{@in6=@local, @in=@rand_addr}}, {{}, 0x0, @in=@rand_addr}}, &(0x7f0000000a40)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000a80)={'team0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000b00)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000b40)={{{@in6, @in6}}, {{}, 0x0, @in=@rand_addr}}, &(0x7f0000000c40)=0xe8) accept4(0xffffffffffffffff, &(0x7f0000000c80)=@xdp, &(0x7f0000000d00)=0x80, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000d40), &(0x7f0000000d80)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0)={@dev, @rand_addr}, &(0x7f0000000e00)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001180)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000011c0)={{{@in=@dev, @in6=@ipv4={[], [], @broadcast}}}, {{@in6=@remote}}}, &(0x7f00000012c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001300)={0x0, @empty, @multicast1}, &(0x7f0000001340)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000009b00)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009b40)={@loopback, @loopback}, &(0x7f0000009b80)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000009c00)={{{@in=@local, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000009d00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009d40)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@local}}, &(0x7f0000009e40)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000009e80)={{{@in6=@dev, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000009f80)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009fc0)={@mcast1}, &(0x7f000000a000)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000a040)={{{@in6=@local, @in=@broadcast}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f000000a140)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000a200)={@rand_addr, @rand_addr}, &(0x7f000000a240)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") 03:33:20 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_emit_ethernet(0x3e, &(0x7f0000000040)={@random="252e47256f1c", @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x8, 0xf, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev}}}}}}, &(0x7f0000000000)) 03:33:20 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x7, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000780), 0xffffffffffffffee, &(0x7f0000000880)={&(0x7f0000000080)=ANY=[@ANYRESOCT], 0x1}}, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) writev(r2, &(0x7f0000000700), 0x1000000000000110) fcntl$getown(r2, 0x9) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x7, 0x1, 0x56a5, 0x0, 0x0, 0x9d53, 0x40020, 0x1, 0x0, 0x5, 0x1000, 0xffffffffffffffff, 0x8b, 0x4, 0x2, 0x8001, 0x0, 0x5, 0x4, 0x0, 0xffffffff00000000, 0x0, 0x0, 0x6, 0x2, 0x6, 0x100, 0xfffffffffffffffb, 0x10001, 0x0, 0x8, 0x3f8000000000, 0x58e, 0x3, 0x4, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x9, 0xffffffff7fffffff}, 0x4001, 0x6, 0x0, 0x7, 0x400, 0x9, 0x23}, 0x0, 0xc, r0, 0x8) 03:33:20 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_emit_ethernet(0x3e, &(0x7f0000000040)={@random="252e47256f1c", @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x8, 0xf, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev}}}}}}, &(0x7f0000000000)) 03:33:20 executing program 5: prctl$seccomp(0x25, 0x705000, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) seccomp(0x0, 0x0, &(0x7f0000000100)) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) eventfd(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000080)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175e55d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") eventfd(0x0) syz_execute_func(&(0x7f0000000140)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 03:33:20 executing program 0: shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0xfffffffffffffffe) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[], 0x0) clock_settime(0x0, &(0x7f00000000c0)={0x77359400}) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) write$P9_RFLUSH(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) clock_nanosleep(0x0, 0x0, &(0x7f00000004c0), &(0x7f00000002c0)) timerfd_create(0x0, 0x0) set_tid_address(&(0x7f00000001c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) socket$inet_icmp_raw(0x2, 0x3, 0x1) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) setpriority(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000340)) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000380)) openat(0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x0, 0x0) [ 1030.669068] syz-executor3 (29781) used greatest stack depth: 9008 bytes left 03:33:20 executing program 2: getrandom(&(0x7f0000000600)=""/148, 0xfffffffffffffdda, 0x3) init_module(&(0x7f0000000080)='ppp0nodev+\x00', 0xb, &(0x7f00000002c0)='&{,\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000006c0)) eventfd2(0x0, 0x0) epoll_create1(0x0) syslog(0x0, &(0x7f0000000380)=""/147, 0x93) socket$unix(0x1, 0x0, 0x0) eventfd2(0x0, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f00000005c0), 0x0, 0x0, 0xfffffffffffffffd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42f9805da05151ef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23416eee26420fd4143238f6eeba39290f38c4827d20c9660f73f70053fed7d7422121010d64ac1e5d71a3b7e0ce9d") perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000380)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d0629002ef3ad0f993d233d234142d85d0967f20f7d44a200660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 03:33:20 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x7, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000780), 0xffffffffffffffee, &(0x7f0000000880)={&(0x7f0000000080)=ANY=[@ANYRESOCT], 0x1}}, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) writev(r2, &(0x7f0000000700), 0x1000000000000110) fcntl$getown(r2, 0x9) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x7, 0x1, 0x56a5, 0x0, 0x0, 0x9d53, 0x40020, 0x1, 0x0, 0x5, 0x1000, 0xffffffffffffffff, 0x8b, 0x4, 0x2, 0x8001, 0x0, 0x5, 0x4, 0x0, 0xffffffff00000000, 0x0, 0x0, 0x6, 0x2, 0x6, 0x100, 0xfffffffffffffffb, 0x10001, 0x0, 0x8, 0x3f8000000000, 0x58e, 0x3, 0x4, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x9, 0xffffffff7fffffff}, 0x4001, 0x6, 0x0, 0x7, 0x400, 0x9, 0x23}, 0x0, 0xc, r0, 0x8) 03:33:20 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0x81, 0x98, &(0x7f00000002c0)="e6ed38af34248efe0a8239c8e28c7a30e7ae38e68bed775ef5964b8a9d3c87cea3bd7088733cdb4487c3657278b1887aec4f1affd3d1dd36d9366a4c035e8ee47aec3a1ee0fffad5f0d17231681899491ad469d467d2139a04fcc43ca2443d9644d680e36d08a67947e1eb22ccb17463fc7bd25b1d08a6842cb500ee32c1fb21b6", &(0x7f0000000380)=""/152, 0xedd}, 0x28) 03:33:20 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x7, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000780), 0xffffffffffffffee, &(0x7f0000000880)={&(0x7f0000000080)=ANY=[@ANYRESOCT], 0x1}}, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) writev(r2, &(0x7f0000000700), 0x1000000000000110) fcntl$getown(r2, 0x9) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x7, 0x1, 0x56a5, 0x0, 0x0, 0x9d53, 0x40020, 0x1, 0x0, 0x5, 0x1000, 0xffffffffffffffff, 0x8b, 0x4, 0x2, 0x8001, 0x0, 0x5, 0x4, 0x0, 0xffffffff00000000, 0x0, 0x0, 0x6, 0x2, 0x6, 0x100, 0xfffffffffffffffb, 0x10001, 0x0, 0x8, 0x3f8000000000, 0x58e, 0x3, 0x4, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x9, 0xffffffff7fffffff}, 0x4001, 0x6, 0x0, 0x7, 0x400, 0x9, 0x23}, 0x0, 0xc, r0, 0x8) 03:33:20 executing program 2: syz_mount_image$ext4(&(0x7f0000000400)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f00000001c0)="0001000000ff000000000000c9030000ec000000010008000000000000000000002400000020000000010000000000006e5fbe5c0000ffff53ef0100010000006e5fbe5a0000c9040000000000000000000000010000000000800000002c0000000000008893ac7fdb92c6059abd43eeb0c98af1724065eb2d0055d046053a261ae4ae4467de341ff27c0b98f50d0a14e8a2b5e10e3c577f62f60f6e51b26d0c4ec47ce916039c269fe42f4a4b8e0a8372c3b41a5c7ed7fe73747883db74edafca7d8caf6f8a46e34ae1c47c1b359666", 0xd0, 0x400}], 0x0, &(0x7f0000000000)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 03:33:20 executing program 5: munmap(&(0x7f0000ff6000/0xa000)=nil, 0xa000) keyctl$set_reqkey_keyring(0x10, 0x0) seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$dspn(&(0x7f00000001c0)='/dev/dsp#\x00', 0x0, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000200)='/dev/urandom\x00', 0x0, 0x0) ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) syz_execute_func(&(0x7f00000003c0)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a5c401e5d8200f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(0xffffffffffffffff, 0x800442d4, &(0x7f0000000040)) creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, &(0x7f0000000100)) 03:33:20 executing program 1: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") [ 1031.176578] EXT4-fs (loop2): Quota format mount options ignored when QUOTA feature is enabled [ 1031.267109] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended 03:33:20 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x7, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000780), 0xffffffffffffffee, &(0x7f0000000880)={&(0x7f0000000080)=ANY=[@ANYRESOCT], 0x1}}, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) writev(r2, &(0x7f0000000700), 0x1000000000000110) fcntl$getown(r2, 0x9) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x7, 0x1, 0x56a5, 0x0, 0x0, 0x9d53, 0x40020, 0x1, 0x0, 0x5, 0x1000, 0xffffffffffffffff, 0x8b, 0x4, 0x2, 0x8001, 0x0, 0x5, 0x4, 0x0, 0xffffffff00000000, 0x0, 0x0, 0x6, 0x2, 0x6, 0x100, 0xfffffffffffffffb, 0x10001, 0x0, 0x8, 0x3f8000000000, 0x58e, 0x3, 0x4, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x9, 0xffffffff7fffffff}, 0x4001, 0x6, 0x0, 0x7, 0x400, 0x9, 0x23}, 0x0, 0xc, r0, 0x8) 03:33:20 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000879ff8), &(0x7f0000106ff8)='./file0\x00', &(0x7f00008d2ffa)='ramfs\x00', 0x0, &(0x7f000063bffe)) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='.') [ 1031.335294] EXT4-fs (loop2): filesystem is read-only [ 1031.371278] EXT4-fs (loop2): Number of reserved GDT blocks insanely large: 26262 03:33:20 executing program 4: keyctl$set_reqkey_keyring(0x4, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) signalfd4(0xffffffffffffffff, &(0x7f00000001c0), 0x8, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000040)={'filter\x00', 0x4}, 0x68) geteuid() setfsuid(0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x0, 'bond_slave_1\x00'}, 0x18) dup(0xffffffffffffff9c) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000440)={'broute\x00', 0x0, 0x0, 0x12, [], 0x0, &(0x7f00000003c0), &(0x7f0000000240)=""/18}, &(0x7f00000004c0)=0x78) syz_execute_func(&(0x7f0000000680)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc7397c2a0f0fcdae300f38211a40a5c441657538c48391683f000f01efe5e57d0fecec1a1a01460f01ee45dfde9f") ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000140)) write$P9_RXATTRWALK(0xffffffffffffffff, &(0x7f0000000280)={0xf}, 0xf) socket$inet6(0xa, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000000)) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) [ 1031.482752] EXT4-fs (loop2): Quota format mount options ignored when QUOTA feature is enabled [ 1031.528765] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended [ 1031.584700] EXT4-fs (loop2): filesystem is read-only [ 1031.622996] EXT4-fs (loop2): Number of reserved GDT blocks insanely large: 26262 03:33:21 executing program 0: prctl$setname(0x59616d61, &(0x7f0000000380)='/dev/midi#\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000700)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefac462fd1e28a676e541b87545d745d71ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f2ab7f") socket$nl_netfilter(0x10, 0x3, 0xc) openat$dir(0xffffffffffffff9c, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0) getpgrp(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000180)) prctl$setendian(0x14, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000380)) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000001340)=ANY=[]) socketpair(0x0, 0x0, 0x0, &(0x7f00000002c0)) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f00000003c0)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000200), 0x4) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f00000001c0)) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fb4175450f2e1a67f20f2cedc4a1c173dfdcf08024030842ec4b") 03:33:21 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prlimit64(0x0, 0x7, &(0x7f00000002c0), &(0x7f0000000440)) clone(0x802102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000b80), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) inotify_init() 03:33:21 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prlimit64(0x0, 0x7, &(0x7f00000002c0), &(0x7f0000000440)) clone(0x802102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000b80), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) inotify_init() 03:33:21 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prlimit64(0x0, 0x7, &(0x7f00000002c0), &(0x7f0000000440)) clone(0x802102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000b80), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) inotify_init() 03:33:21 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prlimit64(0x0, 0x7, &(0x7f00000002c0), &(0x7f0000000440)) clone(0x802102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000b80), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) inotify_init() 03:33:21 executing program 3: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffff9c) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in6=@mcast2, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@local, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000400)=@assoc_value, &(0x7f0000000440)=0x8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000580)=0x14) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000480), &(0x7f0000000540)=0x8) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000380)={@multicast2}, &(0x7f00000003c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f000000be80)={{{@in=@remote, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f000000bf80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f000000c080)={{{@in6=@mcast1, @in=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f000000c180)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f000000c1c0)={0x0, @broadcast, @multicast1}, &(0x7f000000c200)=0xc) accept$packet(0xffffffffffffff9c, &(0x7f000000c440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000c480)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000680)={{{@in6, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000000780)=0xe8) getsockopt$XDP_MMAP_OFFSETS(0xffffffffffffffff, 0x11b, 0x1, &(0x7f00000005c0), &(0x7f0000000640)=0x60) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") 03:33:21 executing program 0: prctl$setname(0x59616d61, &(0x7f0000000380)='/dev/midi#\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000700)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefac462fd1e28a676e541b87545d745d71ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f2ab7f") socket$nl_netfilter(0x10, 0x3, 0xc) openat$dir(0xffffffffffffff9c, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0) getpgrp(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000180)) prctl$setendian(0x14, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000380)) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000001340)=ANY=[]) socketpair(0x0, 0x0, 0x0, &(0x7f00000002c0)) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f00000003c0)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000200), 0x4) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f00000001c0)) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fb4175450f2e1a67f20f2cedc4a1c173dfdcf08024030842ec4b") 03:33:21 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x0) r0 = socket(0x2, 0x802, 0x88) r1 = socket$netlink(0x10, 0x3, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) writev(r1, &(0x7f0000fb1000)=[{&(0x7f0000000180)="480000001400197f09004b0101048c590a88ffffff010001000000000028213ee20600d4ff5bffff00c7e5ed5e00000000000000000000eaf60d18125d4b18857a9eace3dbe8b12c", 0x48}], 0x1) 03:33:21 executing program 1: mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)) getegid() lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000540)=0xc) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getgroups(0x0, &(0x7f0000000700)) getresgid(&(0x7f0000000740), &(0x7f0000000780), &(0x7f00000007c0)) pread64(0xffffffffffffffff, &(0x7f00000004c0)=""/77, 0x4d, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000800)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000240)={'TPROXY\x00'}, &(0x7f0000000340)=0x1e) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000ac0)={@local}, &(0x7f0000000b00)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000b40)={'vcan0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c40)={{{@in, @in6}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000000d40)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000e40)={0x0, @multicast1, @dev}, &(0x7f0000000e80)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002c40)={0x0, @broadcast}, &(0x7f0000002c80)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000002cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002d00)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f0000002d40), &(0x7f0000002d80)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000041c0)={@loopback}, &(0x7f0000004200)=0x14) getpeername(0xffffffffffffffff, &(0x7f0000004280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000004300)=0x80) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004340)={{{@in6=@ipv4={[], [], @local}, @in6}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000004440)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f0000004880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000048c0)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f000000aa40), 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000ab80)={{{@in6, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f000000ac80)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f000001bb00), 0x0, 0x0, &(0x7f000001bd40)={0x77359400}) getpeername(0xffffffffffffffff, &(0x7f000001bd80)=@can, &(0x7f000001be00)=0x80) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000001be40)={@dev, @dev}, &(0x7f000001be80)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f000001e780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000001e7c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f000001e800)={@mcast1}, &(0x7f000001e840)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000001e880)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000b80)={0x0, @broadcast}, &(0x7f0000000bc0)=0xfffffe1d) accept$packet(0xffffffffffffff9c, &(0x7f000001ee00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000001ee40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000001ee80)={{{@in, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f000001ef80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000001efc0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000001f280)={0x0, @multicast2, @remote}, &(0x7f000001f2c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000001f540)={{{@in=@multicast2, @in=@dev}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f000001f640)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f000001f740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000001f780)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f000001f9c0), &(0x7f000001fa00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000001fb00)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000001fc00)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f000001fd00)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000020080)={{{@in6, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000020180)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000020280)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000020380)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000020e40)={&(0x7f00000002c0), 0xc, &(0x7f0000020e00)={&(0x7f00000203c0)={0x14}, 0x14}}, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x0) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) lstat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe3}]}) syz_execute_func(&(0x7f0000000240)="42805da0124fefeddc0f01eea873fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 03:33:21 executing program 2: keyctl$set_reqkey_keyring(0x3, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000380)=ANY=[], 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) write$P9_RLCREATE(0xffffffffffffffff, &(0x7f00000002c0)={0x18}, 0x18) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) ioctl$KVM_S390_INTERRUPT_CPU(0xffffffffffffffff, 0x4010ae94, &(0x7f0000000000)) ioctl$sock_bt_bnep_BNEPGETCONNINFO(0xffffffffffffffff, 0x800442d3, &(0x7f0000000100)={0x0, 0x0, 0x0, @empty, 'team_slave_1\x00'}) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000280), &(0x7f0000000580), 0x0, 0xfffffffffffffff8) syz_execute_func(&(0x7f0000000500)="1cd2805da0616969692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9c81ceefa6be27973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90df55b498985fc3") 03:33:21 executing program 0: prctl$setname(0x59616d61, &(0x7f0000000380)='/dev/midi#\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000700)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefac462fd1e28a676e541b87545d745d71ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f2ab7f") socket$nl_netfilter(0x10, 0x3, 0xc) openat$dir(0xffffffffffffff9c, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0) getpgrp(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000180)) prctl$setendian(0x14, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000380)) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000001340)=ANY=[]) socketpair(0x0, 0x0, 0x0, &(0x7f00000002c0)) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f00000003c0)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000200), 0x4) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f00000001c0)) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fb4175450f2e1a67f20f2cedc4a1c173dfdcf08024030842ec4b") 03:33:21 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xb601}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:33:21 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x0) r0 = socket(0x2, 0x802, 0x88) r1 = socket$netlink(0x10, 0x3, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) writev(r1, &(0x7f0000fb1000)=[{&(0x7f0000000180)="480000001400197f09004b0101048c590a88ffffff010001000000000028213ee20600d4ff5bffff00c7e5ed5e00000000000000000000eaf60d18125d4b18857a9eace3dbe8b12c", 0x48}], 0x1) 03:33:21 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x0) r0 = socket(0x2, 0x802, 0x88) r1 = socket$netlink(0x10, 0x3, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) writev(r1, &(0x7f0000fb1000)=[{&(0x7f0000000180)="480000001400197f09004b0101048c590a88ffffff010001000000000028213ee20600d4ff5bffff00c7e5ed5e00000000000000000000eaf60d18125d4b18857a9eace3dbe8b12c", 0x48}], 0x1) 03:33:21 executing program 0: prctl$setname(0x59616d61, &(0x7f0000000380)='/dev/midi#\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000700)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefac462fd1e28a676e541b87545d745d71ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f2ab7f") socket$nl_netfilter(0x10, 0x3, 0xc) openat$dir(0xffffffffffffff9c, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0) getpgrp(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000180)) prctl$setendian(0x14, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000380)) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000001340)=ANY=[]) socketpair(0x0, 0x0, 0x0, &(0x7f00000002c0)) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f00000003c0)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000200), 0x4) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f00000001c0)) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fb4175450f2e1a67f20f2cedc4a1c173dfdcf08024030842ec4b") 03:33:22 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x0) r0 = socket(0x2, 0x802, 0x88) r1 = socket$netlink(0x10, 0x3, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) writev(r1, &(0x7f0000fb1000)=[{&(0x7f0000000180)="480000001400197f09004b0101048c590a88ffffff010001000000000028213ee20600d4ff5bffff00c7e5ed5e00000000000000000000eaf60d18125d4b18857a9eace3dbe8b12c", 0x48}], 0x1) 03:33:22 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x100, 0x0) r1 = socket(0x1e, 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) sendmsg(r1, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x457d10) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000000)={0x0, @empty, 0x0, 0x0, 'wlc\x00'}, 0x2c) r2 = getegid() setgid(r2) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000040)=0x4, 0x4) close(r1) r3 = dup(r0) ioctl$VHOST_GET_VRING_ENDIAN(r3, 0x4008af14, &(0x7f0000000140)={0x1}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) fstat(0xffffffffffffffff, &(0x7f00000004c0)) getegid() getgroups(0x2, &(0x7f0000000540)=[r4, 0x0]) 03:33:22 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f64009400050028925aa8000000000000008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 03:33:22 executing program 0: semget(0x3, 0x0, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)) memfd_create(&(0x7f00000000c0)='\x00', 0x0) ioctl$SCSI_IOCTL_SYNC(0xffffffffffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffff9c, 0x50, &(0x7f0000000980)}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000001c0), &(0x7f0000000200)=0xc) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000240), 0x10) lstat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)) syz_execute_func(&(0x7f0000000280)="428055a07b6969ef69dc00d9ce41ff0f183755477fde0f38211ac46844d8f28fe943ddb20f0000804e2179fbe54175450f2e1ac4010d64ac1e5d31a3b706c4a17de69a000000009f7f") 03:33:22 executing program 5: getitimer(0x0, &(0x7f0000000600)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) clock_gettime(0x0, &(0x7f0000000240)) write$evdev(0xffffffffffffffff, &(0x7f0000000280), 0x0) syz_execute_func(&(0x7f0000000080)="428055a0610fef69dce9d92a5c41ff0f1837370f08211ac4c482fd2520410feefa4e2179fbe5f5450f38c9365de0932ebc2ebc0d64ac1e5d9f7f") add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000001c0), 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f00000005c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000680)='trusted.overlay.opaque\x00', 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 03:33:22 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20, 0x0, 0x0, 0xfffff034}, {0x6}]}, 0x10) sendmmsg(r1, &(0x7f0000000000), 0x4000000000000fe, 0x0) 03:33:22 executing program 2: keyctl$set_reqkey_keyring(0x5, 0x1b2c23e7) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00') getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000280), &(0x7f00000002c0)=0x10) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000300), 0x8) lseek(0xffffffffffffffff, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000005c0)) lstat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) getgid() getpgid(0x0) getresuid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) fstat(0xffffffffffffffff, &(0x7f0000000780)) getpid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000800)) gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000880)={{{@in=@remote, @in=@dev}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000980)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000009c0)) gettid() stat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000000cc0)) stat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) getpgrp(0xffffffffffffffff) lstat(&(0x7f0000000e00)='./file0\x00', &(0x7f0000000e40)) stat(&(0x7f0000000ec0)='./file0\x00', &(0x7f0000000f00)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) stat(&(0x7f0000000fc0)='./file0\x00', &(0x7f0000001000)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001080), &(0x7f00000010c0)=0xc) getpgrp(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001100)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000001200)=0xe8) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001500)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xe, &(0x7f00000014c0)='oom_score_adj\x00'}, 0x30) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001540)={{{@in6=@remote, @in6=@loopback}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000001640)=0xe8) stat(&(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001ac0)='/dev/vhost-vsock\x00', 0x2, 0x0) getpgrp(0xffffffffffffffff) syz_execute_func(&(0x7f0000000340)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b1adc7f2c4217c291a0feefac4e14b2a492d64f04008346d000000002375328dbbbbe33fc1c1095da358b70647ff745c1e9f7f") 03:33:22 executing program 3: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) getsockopt$llc_int(r0, 0x10c, 0x8, &(0x7f0000000000), &(0x7f0000000180)=0x4) 03:33:22 executing program 3: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) getsockopt$llc_int(r0, 0x10c, 0x8, &(0x7f0000000000), &(0x7f0000000180)=0x4) [ 1033.479598] kasan: CONFIG_KASAN_INLINE enabled 03:33:22 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x1b}]}}}]}, 0x3c}}, 0x0) [ 1033.514467] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 1033.533562] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 1033.533807] kobject: 'loop5' (00000000818f1137): kobject_uevent_env [ 1033.539834] CPU: 1 PID: 29962 Comm: syz-executor1 Not tainted 4.19.0-rc4-next-20180918+ #74 [ 1033.554721] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1033.561046] kobject: 'loop5' (00000000818f1137): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1033.564087] RIP: 0010:__skb_flow_dissect+0x3b5/0x5980 [ 1033.564103] Code: 48 c1 ea 03 80 3c 02 00 0f 85 a6 4d 00 00 48 b8 00 00 00 00 00 fc ff df 4d 8b 77 10 49 8d be 80 05 00 00 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 5c 4d 00 00 4d 8b b6 80 05 00 00 48 b8 00 00 00 [ 1033.564111] RSP: 0018:ffff88012fbbed90 EFLAGS: 00010202 [ 1033.564124] RAX: dffffc0000000000 RBX: ffff88012fbbf160 RCX: ffffc90003268000 [ 1033.564132] RDX: 00000000000000b0 RSI: ffffffff861227d8 RDI: 0000000000000580 [ 1033.564147] RBP: ffff88012fbbf4f0 R08: ffff8801c775a280 R09: ffffed003b585b57 [ 1033.624796] R10: ffffed003b585b57 R11: ffff8801dac2dabb R12: ffffffff8a5202a4 [ 1033.632071] R13: ffffffff8a5202a6 R14: 0000000000000000 R15: ffff8801be041cc0 [ 1033.639387] FS: 00007fa891e14700(0000) GS:ffff8801dad00000(0000) knlGS:0000000000000000 [ 1033.647630] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1033.653514] CR2: 00007fba55ab3000 CR3: 00000001bdd8c000 CR4: 00000000001406e0 [ 1033.660800] DR0: 000000000000b8c4 DR1: 0000000000000000 DR2: 0000000000000000 [ 1033.668085] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 [ 1033.675402] Call Trace: [ 1033.678014] ? kasan_check_read+0x11/0x20 [ 1033.682177] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1033.687486] ? rcu_softirq_qs+0x20/0x20 [ 1033.691469] ? rcu_softirq_qs+0x20/0x20 [ 1033.695461] ? skb_flow_dissect_tunnel_info+0xd80/0xd80 [ 1033.700834] ? kernel_text_address+0x79/0xf0 [ 1033.705252] ? __kernel_text_address+0xd/0x40 [ 1033.709753] ? arch_uprobe_abort_xol+0x1b0/0x200 03:33:23 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x100, 0x0) r1 = socket(0x1e, 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) sendmsg(r1, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x457d10) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000000)={0x0, @empty, 0x0, 0x0, 'wlc\x00'}, 0x2c) r2 = getegid() setgid(r2) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000040)=0x4, 0x4) close(r1) r3 = dup(r0) ioctl$VHOST_GET_VRING_ENDIAN(r3, 0x4008af14, &(0x7f0000000140)={0x1}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) fstat(0xffffffffffffffff, &(0x7f00000004c0)) getegid() getgroups(0x2, &(0x7f0000000540)=[r4, 0x0]) [ 1033.714529] ? __save_stack_trace+0x8d/0xf0 [ 1033.718874] ? save_stack+0xa9/0xd0 [ 1033.722510] ? save_stack+0x43/0xd0 [ 1033.726141] ? kasan_kmalloc+0xc7/0xe0 [ 1033.730032] ? __kmalloc_node_track_caller+0x47/0x70 [ 1033.735161] ? __kmalloc_reserve.isra.39+0x41/0xe0 [ 1033.740096] ? __alloc_skb+0x150/0x770 [ 1033.743986] ? alloc_skb_with_frags+0x133/0x7d0 [ 1033.748663] ? sock_alloc_send_pskb+0x865/0xab0 [ 1033.753349] ? unix_dgram_sendmsg+0x50b/0x1750 [ 1033.757940] ? sock_sendmsg+0xd5/0x120 [ 1033.761842] ? ___sys_sendmsg+0x51d/0x930 [ 1033.766058] ? __sys_sendmmsg+0x246/0x6d0 [ 1033.770219] ? __x64_sys_sendmmsg+0x9d/0x100 [ 1033.774634] ? do_syscall_64+0x1b9/0x820 [ 1033.775537] kobject: 'loop4' (0000000060de7114): kobject_uevent_env [ 1033.778711] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1033.790465] ? rcu_softirq_qs+0x20/0x20 [ 1033.794445] ? print_usage_bug+0xc0/0xc0 [ 1033.798518] ? check_preemption_disabled+0x48/0x200 [ 1033.798603] kobject: 'loop4' (0000000060de7114): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1033.803545] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 1033.803560] ? rcu_pm_notify+0xc0/0xc0 [ 1033.803583] ? __lock_acquire+0x7ec/0x4ec0 [ 1033.803597] ? kmem_cache_alloc_node_trace+0x34b/0x740 [ 1033.803612] ? kasan_unpoison_shadow+0x35/0x50 [ 1033.803626] ? kasan_kmalloc+0xc7/0xe0 [ 1033.803645] ? mark_held_locks+0x130/0x130 [ 1033.803661] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1033.803678] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1033.803689] ? __alloc_skb+0x4c1/0x770 [ 1033.803704] ? skb_scrub_packet+0x490/0x490 [ 1033.803718] ? mark_held_locks+0x130/0x130 [ 1033.803734] ? __lock_acquire+0x7ec/0x4ec0 [ 1033.803748] ? find_held_lock+0x36/0x1c0 [ 1033.803767] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1033.803781] ? refcount_add_not_zero_checked+0x21e/0x330 [ 1033.803795] ? refcount_dec_if_one+0x180/0x180 [ 1033.803809] ? alloc_skb_with_frags+0x508/0x7d0 [ 1033.803823] ? ttwu_stat+0x5c0/0x5c0 [ 1033.803866] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1033.906395] ? refcount_add_checked+0x2f/0x70 [ 1033.910897] ? graph_lock+0x170/0x170 [ 1033.914700] skb_get_poff+0x9b/0x1c0 [ 1033.918411] ? skb_get_poff+0x9b/0x1c0 [ 1033.922298] ? __skb_get_poff+0x2f0/0x2f0 [ 1033.926458] ? __lock_is_held+0xb5/0x140 [ 1033.930525] bpf_skb_get_pay_offset+0x15/0x20 [ 1033.935026] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1033.941048] ? sk_filter_trim_cap+0x38e/0xa60 [ 1033.945547] ? bpf_l3_csum_replace+0x4d0/0x4d0 [ 1033.950131] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1033.955669] ? skb_copy_datagram_from_iter+0x451/0x660 [ 1033.960951] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1033.965970] ? unix_dgram_sendmsg+0x76c/0x1750 [ 1033.970572] ? unix_stream_connect+0x1270/0x1270 [ 1033.975329] ? aa_af_perm+0x5a0/0x5a0 [ 1033.979165] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1033.984702] ? _copy_from_user+0xdf/0x150 [ 1033.988864] ? aa_sock_msg_perm.isra.12+0xba/0x160 [ 1033.993798] ? apparmor_socket_sendmsg+0x29/0x30 [ 1033.998556] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1034.004136] ? security_socket_sendmsg+0x94/0xc0 [ 1034.008892] ? unix_stream_connect+0x1270/0x1270 [ 1034.013654] ? sock_sendmsg+0xd5/0x120 [ 1034.017541] ? ___sys_sendmsg+0x51d/0x930 [ 1034.021697] ? copy_msghdr_from_user+0x580/0x580 [ 1034.026456] ? _raw_spin_unlock_bh+0x30/0x40 [ 1034.031159] ? bpf_prog_store_orig_filter.isra.52+0x147/0x1f0 [ 1034.037054] ? __release_sock+0x3a0/0x3a0 [ 1034.041211] ? __fget_light+0x2e9/0x430 [ 1034.045203] ? fget_raw+0x20/0x20 [ 1034.048689] ? sock_enable_timestamp+0xe0/0xe0 [ 1034.053291] ? ttwu_stat+0x5c0/0x5c0 [ 1034.057048] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1034.062595] ? sockfd_lookup_light+0xc5/0x160 [ 1034.067119] ? __sys_sendmmsg+0x246/0x6d0 [ 1034.071270] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1034.075608] ? aa_sock_opt_perm.isra.11+0xa1/0x130 [ 1034.080546] ? __x64_sys_futex+0x47f/0x6a0 [ 1034.084784] ? do_syscall_64+0x9a/0x820 [ 1034.088759] ? do_syscall_64+0x9a/0x820 [ 1034.092742] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1034.097328] ? trace_hardirqs_on+0xbd/0x310 [ 1034.101682] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1034.107059] ? trace_hardirqs_off_caller+0x300/0x300 [ 1034.112178] ? __x64_sys_sendmmsg+0x9d/0x100 [ 1034.116590] ? do_syscall_64+0x1b9/0x820 [ 1034.120657] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1034.126025] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1034.130959] ? trace_hardirqs_off+0x310/0x310 [ 1034.135457] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1034.140478] ? recalc_sigpending_tsk+0x180/0x180 [ 1034.145233] ? kasan_check_write+0x14/0x20 [ 1034.149470] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1034.154317] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1034.159721] Modules linked in: 03:33:23 executing program 3: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) getsockopt$llc_int(r0, 0x10c, 0x8, &(0x7f0000000000), &(0x7f0000000180)=0x4) [ 1034.203935] kobject: 'loop3' (000000000d3c1255): kobject_uevent_env [ 1034.213389] kobject: 'loop3' (000000000d3c1255): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1034.231684] netlink: 'syz-executor5': attribute type 27 has an invalid length. [ 1034.235426] cgroup: fork rejected by pids controller in /syz4 [ 1034.255854] (unnamed net_device) (uninitialized): option tlb_dynamic_lb: mode dependency failed, not supported in mode balance-rr(0) 03:33:23 executing program 3: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) getsockopt$llc_int(r0, 0x10c, 0x8, &(0x7f0000000000), &(0x7f0000000180)=0x4) 03:33:23 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x100, 0x0) r1 = socket(0x1e, 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) sendmsg(r1, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x457d10) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000000)={0x0, @empty, 0x0, 0x0, 'wlc\x00'}, 0x2c) r2 = getegid() setgid(r2) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000040)=0x4, 0x4) close(r1) r3 = dup(r0) ioctl$VHOST_GET_VRING_ENDIAN(r3, 0x4008af14, &(0x7f0000000140)={0x1}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) fstat(0xffffffffffffffff, &(0x7f00000004c0)) getegid() getgroups(0x2, &(0x7f0000000540)=[r4, 0x0]) [ 1034.299997] kobject: 'loop3' (000000000d3c1255): kobject_uevent_env [ 1034.324615] kobject: 'loop3' (000000000d3c1255): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1034.363524] ---[ end trace c37909f3a2fe012b ]--- [ 1034.368633] RIP: 0010:__skb_flow_dissect+0x3b5/0x5980 [ 1034.383362] kobject: 'loop5' (00000000818f1137): kobject_uevent_env 03:33:23 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x100, 0x0) r1 = socket(0x1e, 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) sendmsg(r1, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x457d10) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000000)={0x0, @empty, 0x0, 0x0, 'wlc\x00'}, 0x2c) r2 = getegid() setgid(r2) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000040)=0x4, 0x4) close(r1) r3 = dup(r0) ioctl$VHOST_GET_VRING_ENDIAN(r3, 0x4008af14, &(0x7f0000000140)={0x1}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) fstat(0xffffffffffffffff, &(0x7f00000004c0)) getegid() getgroups(0x2, &(0x7f0000000540)=[r4, 0x0]) 03:33:23 executing program 0: sync() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001d40)="428055a0866969ef69dc00d93e3e3e660f381ecaa71837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:33:23 executing program 3: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000180)) creat(&(0x7f0000000040)='./file0\x00', 0x0) getsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080), &(0x7f00000000c0)=0x2308ba72b838fcbe) write$P9_RSTAT(0xffffffffffffffff, &(0x7f00000001c0)={0x59, 0x7d, 0x0, {0x0, 0x52, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, "", 0x5, 'syz1\x00', 0x3, ',-:', 0x17, 'vmnet1md5sum*)eth0/ppp1'}}, 0x59) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$nl_route(0x10, 0x3, 0x0) ftruncate(0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000240)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) getpid() [ 1034.401539] Code: 48 c1 ea 03 80 3c 02 00 0f 85 a6 4d 00 00 48 b8 00 00 00 00 00 fc ff df 4d 8b 77 10 49 8d be 80 05 00 00 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 5c 4d 00 00 4d 8b b6 80 05 00 00 48 b8 00 00 00 [ 1034.449503] kobject: 'loop5' (00000000818f1137): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1034.483199] RSP: 0018:ffff88012fbbed90 EFLAGS: 00010202 [ 1034.494058] RAX: dffffc0000000000 RBX: ffff88012fbbf160 RCX: ffffc90003268000 [ 1034.501712] RDX: 00000000000000b0 RSI: ffffffff861227d8 RDI: 0000000000000580 [ 1034.511470] RBP: ffff88012fbbf4f0 R08: ffff8801c775a280 R09: ffffed003b585b57 [ 1034.519797] kobject: 'loop2' (00000000b950519c): kobject_uevent_env [ 1034.520516] R10: ffffed003b585b57 R11: ffff8801dac2dabb R12: ffffffff8a5202a4 [ 1034.553492] R13: ffffffff8a5202a6 R14: 0000000000000000 R15: ffff8801be041cc0 [ 1034.568972] kobject: 'loop2' (00000000b950519c): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1034.573770] FS: 00007fa891e14700(0000) GS:ffff8801dad00000(0000) knlGS:0000000000000000 [ 1034.587245] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1034.593210] CR2: 00007f799923fdb8 CR3: 00000001bdd8c000 CR4: 00000000001406e0 [ 1034.601046] DR0: 000000000000b8c4 DR1: 0000000000000000 DR2: 0000000000000000 [ 1034.608961] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 [ 1034.622712] kobject: 'loop0' (00000000484980be): kobject_uevent_env [ 1034.632277] kobject: 'loop0' (00000000484980be): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1034.642320] Kernel panic - not syncing: Fatal exception [ 1034.648706] Kernel Offset: disabled [ 1034.652328] Rebooting in 86400 seconds..