be8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) getpgrp(0xffffffffffffffff) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000037c0), 0x0, 0x0) 19:01:14 executing program 1: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) 19:01:14 executing program 4: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) 19:01:14 executing program 0: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) 19:01:14 executing program 3: lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000006c40)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) eventfd2(0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) r1 = add_key(&(0x7f0000000440)='ceph\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000004c0)="90a0001969250bf8bfad0541f68d3f029d55991b622a0841b1cb94dca1c029e1a3796ae002e04abf18f53e3688820231f2875df5c4f1fab1ef1c06acb8c2b22c256c1ee4c07938b762de33328bea5d9ffff02eb113f3510d4929ffc01deb164daaa46081cc4f0602ce0452456165d4c68d701f30615c6ae930d13a9492dffb6b1f8613f926cbd93f2781795360c4105ec6672da2937e406237c30c75272322802763f8567f46629e250617197c535483c26c1433bb8d4c556bfa35c742562f28315d3362e46e7bf83a2f8e154fe08ad9a6ca8334d7d83580f3f665802dff6c399a3ee2a27a30c9", 0xe7, 0xffffffffffffffff) keyctl$instantiate_iov(0x14, r0, &(0x7f0000000400)=[{&(0x7f0000000380)="f3740cc4095ac1e1cf177e5f20cf3b054d1a00eead04fe2bf16d9ab4a4f6d8d6452bda281bbfbb7127b67d7996605aad3e21cfcc7f1e7c805b7ff847d63bd573cdcd48e0d10e7329e067c35d79ed8572d760cfc7014b611e56f9b8e9c3f71183e3fea0b80d1810d0", 0x68}], 0x1, r1) inotify_init1(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000240)='\x00', 0xffffffffffffffff}, 0x30) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000006c00)='systemppp0bdevvmnet1\x00'}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000008c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000001c40)='syz0\x00', 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c80)) gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) socket$unix(0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003200), 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003140)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006580), &(0x7f00000065c0)=0xc) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000980)="42805da0c20f460f46dc0f2e2e41d9bfef000000262edcf6208600cdc176f9cbf3f30f1a7f062900c4a1051586a920ffff0f0f99583da358580606eaf30f53cf973121e079afe0302f450f2e628a99c4c4a1ff741c3f04d6660f3830c1befe8adfe2667e") 19:01:15 executing program 5: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) getpgrp(0xffffffffffffffff) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000037c0), 0x0, 0x0) 19:01:15 executing program 0: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) 19:01:15 executing program 4: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) 19:01:15 executing program 3: lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000006c40)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) eventfd2(0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) r1 = add_key(&(0x7f0000000440)='ceph\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000004c0)="90a0001969250bf8bfad0541f68d3f029d55991b622a0841b1cb94dca1c029e1a3796ae002e04abf18f53e3688820231f2875df5c4f1fab1ef1c06acb8c2b22c256c1ee4c07938b762de33328bea5d9ffff02eb113f3510d4929ffc01deb164daaa46081cc4f0602ce0452456165d4c68d701f30615c6ae930d13a9492dffb6b1f8613f926cbd93f2781795360c4105ec6672da2937e406237c30c75272322802763f8567f46629e250617197c535483c26c1433bb8d4c556bfa35c742562f28315d3362e46e7bf83a2f8e154fe08ad9a6ca8334d7d83580f3f665802dff6c399a3ee2a27a30c9", 0xe7, 0xffffffffffffffff) keyctl$instantiate_iov(0x14, r0, &(0x7f0000000400)=[{&(0x7f0000000380)="f3740cc4095ac1e1cf177e5f20cf3b054d1a00eead04fe2bf16d9ab4a4f6d8d6452bda281bbfbb7127b67d7996605aad3e21cfcc7f1e7c805b7ff847d63bd573cdcd48e0d10e7329e067c35d79ed8572d760cfc7014b611e56f9b8e9c3f71183e3fea0b80d1810d0", 0x68}], 0x1, r1) inotify_init1(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000240)='\x00', 0xffffffffffffffff}, 0x30) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000006c00)='systemppp0bdevvmnet1\x00'}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000008c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000001c40)='syz0\x00', 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c80)) gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) socket$unix(0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003200), 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003140)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006580), &(0x7f00000065c0)=0xc) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000980)="42805da0c20f460f46dc0f2e2e41d9bfef000000262edcf6208600cdc176f9cbf3f30f1a7f062900c4a1051586a920ffff0f0f99583da358580606eaf30f53cf973121e079afe0302f450f2e628a99c4c4a1ff741c3f04d6660f3830c1befe8adfe2667e") 19:01:15 executing program 1: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) 19:01:15 executing program 3: lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000006c40)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) eventfd2(0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) r1 = add_key(&(0x7f0000000440)='ceph\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000004c0)="90a0001969250bf8bfad0541f68d3f029d55991b622a0841b1cb94dca1c029e1a3796ae002e04abf18f53e3688820231f2875df5c4f1fab1ef1c06acb8c2b22c256c1ee4c07938b762de33328bea5d9ffff02eb113f3510d4929ffc01deb164daaa46081cc4f0602ce0452456165d4c68d701f30615c6ae930d13a9492dffb6b1f8613f926cbd93f2781795360c4105ec6672da2937e406237c30c75272322802763f8567f46629e250617197c535483c26c1433bb8d4c556bfa35c742562f28315d3362e46e7bf83a2f8e154fe08ad9a6ca8334d7d83580f3f665802dff6c399a3ee2a27a30c9", 0xe7, 0xffffffffffffffff) keyctl$instantiate_iov(0x14, r0, &(0x7f0000000400)=[{&(0x7f0000000380)="f3740cc4095ac1e1cf177e5f20cf3b054d1a00eead04fe2bf16d9ab4a4f6d8d6452bda281bbfbb7127b67d7996605aad3e21cfcc7f1e7c805b7ff847d63bd573cdcd48e0d10e7329e067c35d79ed8572d760cfc7014b611e56f9b8e9c3f71183e3fea0b80d1810d0", 0x68}], 0x1, r1) inotify_init1(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000240)='\x00', 0xffffffffffffffff}, 0x30) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000006c00)='systemppp0bdevvmnet1\x00'}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000008c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000001c40)='syz0\x00', 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c80)) gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) socket$unix(0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003200), 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003140)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006580), &(0x7f00000065c0)=0xc) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000980)="42805da0c20f460f46dc0f2e2e41d9bfef000000262edcf6208600cdc176f9cbf3f30f1a7f062900c4a1051586a920ffff0f0f99583da358580606eaf30f53cf973121e079afe0302f450f2e628a99c4c4a1ff741c3f04d6660f3830c1befe8adfe2667e") 19:01:16 executing program 2: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) getpgrp(0xffffffffffffffff) 19:01:16 executing program 4: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) 19:01:16 executing program 5: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) getpgrp(0xffffffffffffffff) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000037c0), 0x0, 0x0) 19:01:16 executing program 0: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) 19:01:16 executing program 1: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) 19:01:16 executing program 3: lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000006c40)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) eventfd2(0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) r1 = add_key(&(0x7f0000000440)='ceph\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000004c0)="90a0001969250bf8bfad0541f68d3f029d55991b622a0841b1cb94dca1c029e1a3796ae002e04abf18f53e3688820231f2875df5c4f1fab1ef1c06acb8c2b22c256c1ee4c07938b762de33328bea5d9ffff02eb113f3510d4929ffc01deb164daaa46081cc4f0602ce0452456165d4c68d701f30615c6ae930d13a9492dffb6b1f8613f926cbd93f2781795360c4105ec6672da2937e406237c30c75272322802763f8567f46629e250617197c535483c26c1433bb8d4c556bfa35c742562f28315d3362e46e7bf83a2f8e154fe08ad9a6ca8334d7d83580f3f665802dff6c399a3ee2a27a30c9", 0xe7, 0xffffffffffffffff) keyctl$instantiate_iov(0x14, r0, &(0x7f0000000400)=[{&(0x7f0000000380)="f3740cc4095ac1e1cf177e5f20cf3b054d1a00eead04fe2bf16d9ab4a4f6d8d6452bda281bbfbb7127b67d7996605aad3e21cfcc7f1e7c805b7ff847d63bd573cdcd48e0d10e7329e067c35d79ed8572d760cfc7014b611e56f9b8e9c3f71183e3fea0b80d1810d0", 0x68}], 0x1, r1) inotify_init1(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000240)='\x00', 0xffffffffffffffff}, 0x30) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000006c00)='systemppp0bdevvmnet1\x00'}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000008c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000001c40)='syz0\x00', 0x200002, 0x0) getpgrp(0x0) gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) socket$unix(0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003200), 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003140)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006580), &(0x7f00000065c0)=0xc) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000980)="42805da0c20f460f46dc0f2e2e41d9bfef000000262edcf6208600cdc176f9cbf3f30f1a7f062900c4a1051586a920ffff0f0f99583da358580606eaf30f53cf973121e079afe0302f450f2e628a99c4c4a1ff741c3f04d6660f3830c1befe8adfe2667e") 19:01:17 executing program 0: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) 19:01:17 executing program 0: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) 19:01:17 executing program 5: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) getpgrp(0xffffffffffffffff) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000037c0), 0x0, 0x0) 19:01:17 executing program 4: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) 19:01:17 executing program 3: lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000006c40)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) eventfd2(0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) r1 = add_key(&(0x7f0000000440)='ceph\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000004c0)="90a0001969250bf8bfad0541f68d3f029d55991b622a0841b1cb94dca1c029e1a3796ae002e04abf18f53e3688820231f2875df5c4f1fab1ef1c06acb8c2b22c256c1ee4c07938b762de33328bea5d9ffff02eb113f3510d4929ffc01deb164daaa46081cc4f0602ce0452456165d4c68d701f30615c6ae930d13a9492dffb6b1f8613f926cbd93f2781795360c4105ec6672da2937e406237c30c75272322802763f8567f46629e250617197c535483c26c1433bb8d4c556bfa35c742562f28315d3362e46e7bf83a2f8e154fe08ad9a6ca8334d7d83580f3f665802dff6c399a3ee2a27a30c9", 0xe7, 0xffffffffffffffff) keyctl$instantiate_iov(0x14, r0, &(0x7f0000000400)=[{&(0x7f0000000380)="f3740cc4095ac1e1cf177e5f20cf3b054d1a00eead04fe2bf16d9ab4a4f6d8d6452bda281bbfbb7127b67d7996605aad3e21cfcc7f1e7c805b7ff847d63bd573cdcd48e0d10e7329e067c35d79ed8572d760cfc7014b611e56f9b8e9c3f71183e3fea0b80d1810d0", 0x68}], 0x1, r1) inotify_init1(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000240)='\x00', 0xffffffffffffffff}, 0x30) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000006c00)='systemppp0bdevvmnet1\x00'}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000008c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000001c40)='syz0\x00', 0x200002, 0x0) getpgrp(0x0) gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) socket$unix(0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003200), 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003140)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006580), &(0x7f00000065c0)=0xc) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000980)="42805da0c20f460f46dc0f2e2e41d9bfef000000262edcf6208600cdc176f9cbf3f30f1a7f062900c4a1051586a920ffff0f0f99583da358580606eaf30f53cf973121e079afe0302f450f2e628a99c4c4a1ff741c3f04d6660f3830c1befe8adfe2667e") 19:01:17 executing program 1: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) 19:01:18 executing program 2: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) getpgrp(0xffffffffffffffff) 19:01:18 executing program 0: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) 19:01:18 executing program 5: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) getpgrp(0xffffffffffffffff) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000037c0), 0x0, 0x0) 19:01:18 executing program 4: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) 19:01:18 executing program 0: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) 19:01:18 executing program 1: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) 19:01:18 executing program 3: lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000006c40)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) eventfd2(0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) r1 = add_key(&(0x7f0000000440)='ceph\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000004c0)="90a0001969250bf8bfad0541f68d3f029d55991b622a0841b1cb94dca1c029e1a3796ae002e04abf18f53e3688820231f2875df5c4f1fab1ef1c06acb8c2b22c256c1ee4c07938b762de33328bea5d9ffff02eb113f3510d4929ffc01deb164daaa46081cc4f0602ce0452456165d4c68d701f30615c6ae930d13a9492dffb6b1f8613f926cbd93f2781795360c4105ec6672da2937e406237c30c75272322802763f8567f46629e250617197c535483c26c1433bb8d4c556bfa35c742562f28315d3362e46e7bf83a2f8e154fe08ad9a6ca8334d7d83580f3f665802dff6c399a3ee2a27a30c9", 0xe7, 0xffffffffffffffff) keyctl$instantiate_iov(0x14, r0, &(0x7f0000000400)=[{&(0x7f0000000380)="f3740cc4095ac1e1cf177e5f20cf3b054d1a00eead04fe2bf16d9ab4a4f6d8d6452bda281bbfbb7127b67d7996605aad3e21cfcc7f1e7c805b7ff847d63bd573cdcd48e0d10e7329e067c35d79ed8572d760cfc7014b611e56f9b8e9c3f71183e3fea0b80d1810d0", 0x68}], 0x1, r1) inotify_init1(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000240)='\x00', 0xffffffffffffffff}, 0x30) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000006c00)='systemppp0bdevvmnet1\x00'}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000008c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000001c40)='syz0\x00', 0x200002, 0x0) getpgrp(0x0) gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) socket$unix(0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003200), 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003140)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006580), &(0x7f00000065c0)=0xc) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000980)="42805da0c20f460f46dc0f2e2e41d9bfef000000262edcf6208600cdc176f9cbf3f30f1a7f062900c4a1051586a920ffff0f0f99583da358580606eaf30f53cf973121e079afe0302f450f2e628a99c4c4a1ff741c3f04d6660f3830c1befe8adfe2667e") 19:01:18 executing program 0: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) 19:01:18 executing program 0: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) 19:01:19 executing program 4: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) 19:01:19 executing program 5: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) getpgrp(0xffffffffffffffff) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000037c0), 0x0, 0x0) 19:01:19 executing program 3: lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000006c40)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) eventfd2(0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) r1 = add_key(&(0x7f0000000440)='ceph\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000004c0)="90a0001969250bf8bfad0541f68d3f029d55991b622a0841b1cb94dca1c029e1a3796ae002e04abf18f53e3688820231f2875df5c4f1fab1ef1c06acb8c2b22c256c1ee4c07938b762de33328bea5d9ffff02eb113f3510d4929ffc01deb164daaa46081cc4f0602ce0452456165d4c68d701f30615c6ae930d13a9492dffb6b1f8613f926cbd93f2781795360c4105ec6672da2937e406237c30c75272322802763f8567f46629e250617197c535483c26c1433bb8d4c556bfa35c742562f28315d3362e46e7bf83a2f8e154fe08ad9a6ca8334d7d83580f3f665802dff6c399a3ee2a27a30c9", 0xe7, 0xffffffffffffffff) keyctl$instantiate_iov(0x14, r0, &(0x7f0000000400)=[{&(0x7f0000000380)="f3740cc4095ac1e1cf177e5f20cf3b054d1a00eead04fe2bf16d9ab4a4f6d8d6452bda281bbfbb7127b67d7996605aad3e21cfcc7f1e7c805b7ff847d63bd573cdcd48e0d10e7329e067c35d79ed8572d760cfc7014b611e56f9b8e9c3f71183e3fea0b80d1810d0", 0x68}], 0x1, r1) inotify_init1(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000240)='\x00', 0xffffffffffffffff}, 0x30) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000006c00)='systemppp0bdevvmnet1\x00'}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000008c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c80)) getpgrp(0x0) gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) socket$unix(0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003200), 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003140)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006580), &(0x7f00000065c0)=0xc) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000980)="42805da0c20f460f46dc0f2e2e41d9bfef000000262edcf6208600cdc176f9cbf3f30f1a7f062900c4a1051586a920ffff0f0f99583da358580606eaf30f53cf973121e079afe0302f450f2e628a99c4c4a1ff741c3f04d6660f3830c1befe8adfe2667e") 19:01:20 executing program 2: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) getpgrp(0xffffffffffffffff) 19:01:20 executing program 0: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) 19:01:20 executing program 1: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) 19:01:20 executing program 4: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) 19:01:20 executing program 5: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) getpgrp(0xffffffffffffffff) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000037c0), 0x0, 0x0) 19:01:20 executing program 3: lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000006c40)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) eventfd2(0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) r1 = add_key(&(0x7f0000000440)='ceph\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000004c0)="90a0001969250bf8bfad0541f68d3f029d55991b622a0841b1cb94dca1c029e1a3796ae002e04abf18f53e3688820231f2875df5c4f1fab1ef1c06acb8c2b22c256c1ee4c07938b762de33328bea5d9ffff02eb113f3510d4929ffc01deb164daaa46081cc4f0602ce0452456165d4c68d701f30615c6ae930d13a9492dffb6b1f8613f926cbd93f2781795360c4105ec6672da2937e406237c30c75272322802763f8567f46629e250617197c535483c26c1433bb8d4c556bfa35c742562f28315d3362e46e7bf83a2f8e154fe08ad9a6ca8334d7d83580f3f665802dff6c399a3ee2a27a30c9", 0xe7, 0xffffffffffffffff) keyctl$instantiate_iov(0x14, r0, &(0x7f0000000400)=[{&(0x7f0000000380)="f3740cc4095ac1e1cf177e5f20cf3b054d1a00eead04fe2bf16d9ab4a4f6d8d6452bda281bbfbb7127b67d7996605aad3e21cfcc7f1e7c805b7ff847d63bd573cdcd48e0d10e7329e067c35d79ed8572d760cfc7014b611e56f9b8e9c3f71183e3fea0b80d1810d0", 0x68}], 0x1, r1) inotify_init1(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000240)='\x00', 0xffffffffffffffff}, 0x30) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000006c00)='systemppp0bdevvmnet1\x00'}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000008c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c80)) getpgrp(0x0) gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) socket$unix(0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003200), 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003140)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006580), &(0x7f00000065c0)=0xc) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000980)="42805da0c20f460f46dc0f2e2e41d9bfef000000262edcf6208600cdc176f9cbf3f30f1a7f062900c4a1051586a920ffff0f0f99583da358580606eaf30f53cf973121e079afe0302f450f2e628a99c4c4a1ff741c3f04d6660f3830c1befe8adfe2667e") 19:01:20 executing program 5: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) getpgrp(0xffffffffffffffff) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000037c0), 0x0, 0x0) 19:01:20 executing program 5: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) getpgrp(0xffffffffffffffff) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000037c0), 0x0, 0x0) 19:01:20 executing program 5: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) getpgrp(0xffffffffffffffff) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000037c0), 0x0, 0x0) 19:01:20 executing program 5: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) getpgrp(0xffffffffffffffff) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000037c0), 0x0, 0x0) 19:01:20 executing program 5: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) getpgrp(0xffffffffffffffff) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000037c0), 0x0, 0x0) 19:01:20 executing program 5: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) getpgrp(0xffffffffffffffff) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000037c0), 0x0, 0x0) 19:01:21 executing program 2: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) getpgrp(0xffffffffffffffff) 19:01:21 executing program 5: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) getpgrp(0xffffffffffffffff) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000037c0), 0x0, 0x0) 19:01:21 executing program 4: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) 19:01:21 executing program 0: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) 19:01:21 executing program 1: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) 19:01:21 executing program 3: lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000006c40)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) eventfd2(0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) r1 = add_key(&(0x7f0000000440)='ceph\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000004c0)="90a0001969250bf8bfad0541f68d3f029d55991b622a0841b1cb94dca1c029e1a3796ae002e04abf18f53e3688820231f2875df5c4f1fab1ef1c06acb8c2b22c256c1ee4c07938b762de33328bea5d9ffff02eb113f3510d4929ffc01deb164daaa46081cc4f0602ce0452456165d4c68d701f30615c6ae930d13a9492dffb6b1f8613f926cbd93f2781795360c4105ec6672da2937e406237c30c75272322802763f8567f46629e250617197c535483c26c1433bb8d4c556bfa35c742562f28315d3362e46e7bf83a2f8e154fe08ad9a6ca8334d7d83580f3f665802dff6c399a3ee2a27a30c9", 0xe7, 0xffffffffffffffff) keyctl$instantiate_iov(0x14, r0, &(0x7f0000000400)=[{&(0x7f0000000380)="f3740cc4095ac1e1cf177e5f20cf3b054d1a00eead04fe2bf16d9ab4a4f6d8d6452bda281bbfbb7127b67d7996605aad3e21cfcc7f1e7c805b7ff847d63bd573cdcd48e0d10e7329e067c35d79ed8572d760cfc7014b611e56f9b8e9c3f71183e3fea0b80d1810d0", 0x68}], 0x1, r1) inotify_init1(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000240)='\x00', 0xffffffffffffffff}, 0x30) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000006c00)='systemppp0bdevvmnet1\x00'}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000008c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c80)) getpgrp(0x0) gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) socket$unix(0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003200), 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003140)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006580), &(0x7f00000065c0)=0xc) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000980)="42805da0c20f460f46dc0f2e2e41d9bfef000000262edcf6208600cdc176f9cbf3f30f1a7f062900c4a1051586a920ffff0f0f99583da358580606eaf30f53cf973121e079afe0302f450f2e628a99c4c4a1ff741c3f04d6660f3830c1befe8adfe2667e") 19:01:21 executing program 5: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) getpgrp(0xffffffffffffffff) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000037c0), 0x0, 0x0) 19:01:21 executing program 5: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) getpgrp(0xffffffffffffffff) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000037c0), 0x0, 0x0) 19:01:21 executing program 4: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) 19:01:21 executing program 4: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) 19:01:21 executing program 4: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) 19:01:21 executing program 4: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) 19:01:22 executing program 0: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) 19:01:22 executing program 4: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) 19:01:22 executing program 2: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) getpgrp(0xffffffffffffffff) 19:01:22 executing program 5: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) getpgrp(0xffffffffffffffff) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000037c0), 0x0, 0x0) 19:01:22 executing program 3: lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000006c40)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) eventfd2(0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) r1 = add_key(&(0x7f0000000440)='ceph\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000004c0)="90a0001969250bf8bfad0541f68d3f029d55991b622a0841b1cb94dca1c029e1a3796ae002e04abf18f53e3688820231f2875df5c4f1fab1ef1c06acb8c2b22c256c1ee4c07938b762de33328bea5d9ffff02eb113f3510d4929ffc01deb164daaa46081cc4f0602ce0452456165d4c68d701f30615c6ae930d13a9492dffb6b1f8613f926cbd93f2781795360c4105ec6672da2937e406237c30c75272322802763f8567f46629e250617197c535483c26c1433bb8d4c556bfa35c742562f28315d3362e46e7bf83a2f8e154fe08ad9a6ca8334d7d83580f3f665802dff6c399a3ee2a27a30c9", 0xe7, 0xffffffffffffffff) keyctl$instantiate_iov(0x14, r0, &(0x7f0000000400)=[{&(0x7f0000000380)="f3740cc4095ac1e1cf177e5f20cf3b054d1a00eead04fe2bf16d9ab4a4f6d8d6452bda281bbfbb7127b67d7996605aad3e21cfcc7f1e7c805b7ff847d63bd573cdcd48e0d10e7329e067c35d79ed8572d760cfc7014b611e56f9b8e9c3f71183e3fea0b80d1810d0", 0x68}], 0x1, r1) inotify_init1(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000240)='\x00', 0xffffffffffffffff}, 0x30) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000006c00)='systemppp0bdevvmnet1\x00'}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000008c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000001c40)='syz0\x00', 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c80)) getpgrp(0x0) gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) socket$unix(0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003200), 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003140)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006580), &(0x7f00000065c0)=0xc) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000980)="42805da0c20f460f46dc0f2e2e41d9bfef000000262edcf6208600cdc176f9cbf3f30f1a7f062900c4a1051586a920ffff0f0f99583da358580606eaf30f53cf973121e079afe0302f450f2e628a99c4c4a1ff741c3f04d6660f3830c1befe8adfe2667e") 19:01:22 executing program 1: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) 19:01:23 executing program 0: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) 19:01:23 executing program 5: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) getpgrp(0xffffffffffffffff) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000037c0), 0x0, 0x0) 19:01:23 executing program 4: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) 19:01:23 executing program 3: lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000006c40)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) eventfd2(0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) r1 = add_key(&(0x7f0000000440)='ceph\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000004c0)="90a0001969250bf8bfad0541f68d3f029d55991b622a0841b1cb94dca1c029e1a3796ae002e04abf18f53e3688820231f2875df5c4f1fab1ef1c06acb8c2b22c256c1ee4c07938b762de33328bea5d9ffff02eb113f3510d4929ffc01deb164daaa46081cc4f0602ce0452456165d4c68d701f30615c6ae930d13a9492dffb6b1f8613f926cbd93f2781795360c4105ec6672da2937e406237c30c75272322802763f8567f46629e250617197c535483c26c1433bb8d4c556bfa35c742562f28315d3362e46e7bf83a2f8e154fe08ad9a6ca8334d7d83580f3f665802dff6c399a3ee2a27a30c9", 0xe7, 0xffffffffffffffff) keyctl$instantiate_iov(0x14, r0, &(0x7f0000000400)=[{&(0x7f0000000380)="f3740cc4095ac1e1cf177e5f20cf3b054d1a00eead04fe2bf16d9ab4a4f6d8d6452bda281bbfbb7127b67d7996605aad3e21cfcc7f1e7c805b7ff847d63bd573cdcd48e0d10e7329e067c35d79ed8572d760cfc7014b611e56f9b8e9c3f71183e3fea0b80d1810d0", 0x68}], 0x1, r1) inotify_init1(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000240)='\x00', 0xffffffffffffffff}, 0x30) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000006c00)='systemppp0bdevvmnet1\x00'}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000008c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000001c40)='syz0\x00', 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c80)) getpgrp(0x0) gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) socket$unix(0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003200), 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003140)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006580), &(0x7f00000065c0)=0xc) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000980)="42805da0c20f460f46dc0f2e2e41d9bfef000000262edcf6208600cdc176f9cbf3f30f1a7f062900c4a1051586a920ffff0f0f99583da358580606eaf30f53cf973121e079afe0302f450f2e628a99c4c4a1ff741c3f04d6660f3830c1befe8adfe2667e") 19:01:23 executing program 1: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) 19:01:24 executing program 5: clone(0x200, &(0x7f00000000c0), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000280)) r0 = creat(&(0x7f00000000c0)='./file1\x00', 0x28) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000000440), &(0x7f0000000200)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000680)='/dev/ptmx\x00', 0x0, 0x0) read(r1, &(0x7f0000000300)=""/11, 0xb) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)) clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) r2 = fcntl$dupfd(r1, 0x0, r0) execve(&(0x7f00000007c0)='./file1\x00', &(0x7f0000000740), &(0x7f00000004c0)) open$dir(&(0x7f0000000540)='./file0\x00', 0x82, 0x0) ioctl$EVIOCGKEYCODE(r2, 0x80084504, &(0x7f0000000240)=""/110) ioctl$sock_inet_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000040)) 19:01:24 executing program 4: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) 19:01:24 executing program 0: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) 19:01:24 executing program 1: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) 19:01:24 executing program 2: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) getpgrp(0xffffffffffffffff) 19:01:24 executing program 3: lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000006c40)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) eventfd2(0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) r1 = add_key(&(0x7f0000000440)='ceph\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000004c0)="90a0001969250bf8bfad0541f68d3f029d55991b622a0841b1cb94dca1c029e1a3796ae002e04abf18f53e3688820231f2875df5c4f1fab1ef1c06acb8c2b22c256c1ee4c07938b762de33328bea5d9ffff02eb113f3510d4929ffc01deb164daaa46081cc4f0602ce0452456165d4c68d701f30615c6ae930d13a9492dffb6b1f8613f926cbd93f2781795360c4105ec6672da2937e406237c30c75272322802763f8567f46629e250617197c535483c26c1433bb8d4c556bfa35c742562f28315d3362e46e7bf83a2f8e154fe08ad9a6ca8334d7d83580f3f665802dff6c399a3ee2a27a30c9", 0xe7, 0xffffffffffffffff) keyctl$instantiate_iov(0x14, r0, &(0x7f0000000400)=[{&(0x7f0000000380)="f3740cc4095ac1e1cf177e5f20cf3b054d1a00eead04fe2bf16d9ab4a4f6d8d6452bda281bbfbb7127b67d7996605aad3e21cfcc7f1e7c805b7ff847d63bd573cdcd48e0d10e7329e067c35d79ed8572d760cfc7014b611e56f9b8e9c3f71183e3fea0b80d1810d0", 0x68}], 0x1, r1) inotify_init1(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000240)='\x00', 0xffffffffffffffff}, 0x30) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000006c00)='systemppp0bdevvmnet1\x00'}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000008c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000001c40)='syz0\x00', 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c80)) getpgrp(0x0) gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) socket$unix(0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003200), 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003140)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006580), &(0x7f00000065c0)=0xc) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000980)="42805da0c20f460f46dc0f2e2e41d9bfef000000262edcf6208600cdc176f9cbf3f30f1a7f062900c4a1051586a920ffff0f0f99583da358580606eaf30f53cf973121e079afe0302f450f2e628a99c4c4a1ff741c3f04d6660f3830c1befe8adfe2667e") 19:01:24 executing program 4: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) 19:01:24 executing program 0: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) 19:01:25 executing program 5: prctl$setmm(0x59616d61, 0x0, &(0x7f0000ffd000/0x2000)=nil) gettid() ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000002640)=""/4096) socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast1, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in=@loopback}}, &(0x7f00000003c0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f00000004c0)={'bridge0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000500)={'veth1_to_team\x00'}) accept$packet(0xffffffffffffff9c, &(0x7f0000001c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001cc0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000001d00)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001d40)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000001e40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000001e80)={{{@in=@local, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000001f80)=0xe8) socket(0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000280)={@dev}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002040)={@rand_addr, @rand_addr}, &(0x7f0000002080)=0xc) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f00000020c0)={@rand_addr, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000002140)={0x0, @loopback, @broadcast}, &(0x7f0000002180)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000002340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002380)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000023c0)={{{@in6=@dev, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f00000024c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004a00)={{{@in=@local, @in=@loopback}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000180)=0x1c6) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004b40)={{{@in=@remote}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f0000004c40)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004c80)={0x0, @remote, @dev}, &(0x7f0000004cc0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000004d40)={{{@in=@dev, @in=@multicast1}}, {{@in=@dev}, 0x0, @in=@remote}}, &(0x7f0000004e40)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000004f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000004fc0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000005580)={&(0x7f0000000040), 0xc, &(0x7f0000005540)={&(0x7f0000005000)=ANY=[]}}, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00'}, 0x10) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000240)) syz_execute_func(&(0x7f0000000540)="42805da0636969ef69dc00d9c422f9db3869203637c3397c2a45ac0f6a88a3ae88a3ae219864a741dfe0400f01efe1e57638ecec01460f01ee31a3b786e2989f") 19:01:25 executing program 3: lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000006c40)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) eventfd2(0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) r1 = add_key(&(0x7f0000000440)='ceph\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000004c0)="90a0001969250bf8bfad0541f68d3f029d55991b622a0841b1cb94dca1c029e1a3796ae002e04abf18f53e3688820231f2875df5c4f1fab1ef1c06acb8c2b22c256c1ee4c07938b762de33328bea5d9ffff02eb113f3510d4929ffc01deb164daaa46081cc4f0602ce0452456165d4c68d701f30615c6ae930d13a9492dffb6b1f8613f926cbd93f2781795360c4105ec6672da2937e406237c30c75272322802763f8567f46629e250617197c535483c26c1433bb8d4c556bfa35c742562f28315d3362e46e7bf83a2f8e154fe08ad9a6ca8334d7d83580f3f665802dff6c399a3ee2a27a30c9", 0xe7, 0xffffffffffffffff) keyctl$instantiate_iov(0x14, r0, &(0x7f0000000400)=[{&(0x7f0000000380)="f3740cc4095ac1e1cf177e5f20cf3b054d1a00eead04fe2bf16d9ab4a4f6d8d6452bda281bbfbb7127b67d7996605aad3e21cfcc7f1e7c805b7ff847d63bd573cdcd48e0d10e7329e067c35d79ed8572d760cfc7014b611e56f9b8e9c3f71183e3fea0b80d1810d0", 0x68}], 0x1, r1) inotify_init1(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000240)='\x00', 0xffffffffffffffff}, 0x30) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000006c00)='systemppp0bdevvmnet1\x00'}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000008c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000001c40)='syz0\x00', 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c80)) getpgrp(0x0) gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) socket$unix(0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003200), 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003140)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006580), &(0x7f00000065c0)=0xc) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000980)="42805da0c20f460f46dc0f2e2e41d9bfef000000262edcf6208600cdc176f9cbf3f30f1a7f062900c4a1051586a920ffff0f0f99583da358580606eaf30f53cf973121e079afe0302f450f2e628a99c4c4a1ff741c3f04d6660f3830c1befe8adfe2667e") 19:01:25 executing program 1: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) 19:01:25 executing program 3: lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000006c40)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) eventfd2(0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) r1 = add_key(&(0x7f0000000440)='ceph\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000004c0)="90a0001969250bf8bfad0541f68d3f029d55991b622a0841b1cb94dca1c029e1a3796ae002e04abf18f53e3688820231f2875df5c4f1fab1ef1c06acb8c2b22c256c1ee4c07938b762de33328bea5d9ffff02eb113f3510d4929ffc01deb164daaa46081cc4f0602ce0452456165d4c68d701f30615c6ae930d13a9492dffb6b1f8613f926cbd93f2781795360c4105ec6672da2937e406237c30c75272322802763f8567f46629e250617197c535483c26c1433bb8d4c556bfa35c742562f28315d3362e46e7bf83a2f8e154fe08ad9a6ca8334d7d83580f3f665802dff6c399a3ee2a27a30c9", 0xe7, 0xffffffffffffffff) keyctl$instantiate_iov(0x14, r0, &(0x7f0000000400)=[{&(0x7f0000000380)="f3740cc4095ac1e1cf177e5f20cf3b054d1a00eead04fe2bf16d9ab4a4f6d8d6452bda281bbfbb7127b67d7996605aad3e21cfcc7f1e7c805b7ff847d63bd573cdcd48e0d10e7329e067c35d79ed8572d760cfc7014b611e56f9b8e9c3f71183e3fea0b80d1810d0", 0x68}], 0x1, r1) inotify_init1(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000240)='\x00', 0xffffffffffffffff}, 0x30) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000006c00)='systemppp0bdevvmnet1\x00'}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000008c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000001c40)='syz0\x00', 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c80)) getpgrp(0x0) gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) socket$unix(0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003200), 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003140)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006580), &(0x7f00000065c0)=0xc) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000980)="42805da0c20f460f46dc0f2e2e41d9bfef000000262edcf6208600cdc176f9cbf3f30f1a7f062900c4a1051586a920ffff0f0f99583da358580606eaf30f53cf973121e079afe0302f450f2e628a99c4c4a1ff741c3f04d6660f3830c1befe8adfe2667e") 19:01:25 executing program 4: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) 19:01:25 executing program 0: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) 19:01:26 executing program 5: clone(0x200, &(0x7f0000005980), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000005940)) mknod(&(0x7f0000000380)='./file0\x00', 0x103e, 0x0) execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000000640), &(0x7f0000000600)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f00000005c0)=""/11, 0x37b) clone(0x3102000ffa, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x200000841, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x94) connect$inet6(r2, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = dup2(r2, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x131f64) wait4(0x0, &(0x7f0000000180), 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r3, 0x29, 0xd2, &(0x7f0000000200)={{0xa, 0x0, 0x0, @local}}, 0x5c) 19:01:26 executing program 1: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) 19:01:26 executing program 2: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) getpgrp(0xffffffffffffffff) 19:01:26 executing program 3: lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000006c40)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) eventfd2(0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) r1 = add_key(&(0x7f0000000440)='ceph\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000004c0)="90a0001969250bf8bfad0541f68d3f029d55991b622a0841b1cb94dca1c029e1a3796ae002e04abf18f53e3688820231f2875df5c4f1fab1ef1c06acb8c2b22c256c1ee4c07938b762de33328bea5d9ffff02eb113f3510d4929ffc01deb164daaa46081cc4f0602ce0452456165d4c68d701f30615c6ae930d13a9492dffb6b1f8613f926cbd93f2781795360c4105ec6672da2937e406237c30c75272322802763f8567f46629e250617197c535483c26c1433bb8d4c556bfa35c742562f28315d3362e46e7bf83a2f8e154fe08ad9a6ca8334d7d83580f3f665802dff6c399a3ee2a27a30c9", 0xe7, 0xffffffffffffffff) keyctl$instantiate_iov(0x14, r0, &(0x7f0000000400)=[{&(0x7f0000000380)="f3740cc4095ac1e1cf177e5f20cf3b054d1a00eead04fe2bf16d9ab4a4f6d8d6452bda281bbfbb7127b67d7996605aad3e21cfcc7f1e7c805b7ff847d63bd573cdcd48e0d10e7329e067c35d79ed8572d760cfc7014b611e56f9b8e9c3f71183e3fea0b80d1810d0", 0x68}], 0x1, r1) inotify_init1(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000240)='\x00', 0xffffffffffffffff}, 0x30) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000006c00)='systemppp0bdevvmnet1\x00'}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000008c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000001c40)='syz0\x00', 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c80)) getpgrp(0x0) gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) socket$unix(0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003200), 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003140)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006580), &(0x7f00000065c0)=0xc) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000980)="42805da0c20f460f46dc0f2e2e41d9bfef000000262edcf6208600cdc176f9cbf3f30f1a7f062900c4a1051586a920ffff0f0f99583da358580606eaf30f53cf973121e079afe0302f450f2e628a99c4c4a1ff741c3f04d6660f3830c1befe8adfe2667e") 19:01:26 executing program 4: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) 19:01:26 executing program 0: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) 19:01:27 executing program 1: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) 19:01:27 executing program 5: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004080)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffe1e, &(0x7f0000003d00)='*#(-nodev@\x00'}, 0x30) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003d80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003ec0), 0x0, 0x0) 19:01:27 executing program 3: lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000006c40)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) eventfd2(0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) r1 = add_key(&(0x7f0000000440)='ceph\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000004c0)="90a0001969250bf8bfad0541f68d3f029d55991b622a0841b1cb94dca1c029e1a3796ae002e04abf18f53e3688820231f2875df5c4f1fab1ef1c06acb8c2b22c256c1ee4c07938b762de33328bea5d9ffff02eb113f3510d4929ffc01deb164daaa46081cc4f0602ce0452456165d4c68d701f30615c6ae930d13a9492dffb6b1f8613f926cbd93f2781795360c4105ec6672da2937e406237c30c75272322802763f8567f46629e250617197c535483c26c1433bb8d4c556bfa35c742562f28315d3362e46e7bf83a2f8e154fe08ad9a6ca8334d7d83580f3f665802dff6c399a3ee2a27a30c9", 0xe7, 0xffffffffffffffff) keyctl$instantiate_iov(0x14, r0, &(0x7f0000000400)=[{&(0x7f0000000380)="f3740cc4095ac1e1cf177e5f20cf3b054d1a00eead04fe2bf16d9ab4a4f6d8d6452bda281bbfbb7127b67d7996605aad3e21cfcc7f1e7c805b7ff847d63bd573cdcd48e0d10e7329e067c35d79ed8572d760cfc7014b611e56f9b8e9c3f71183e3fea0b80d1810d0", 0x68}], 0x1, r1) inotify_init1(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000240)='\x00', 0xffffffffffffffff}, 0x30) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000006c00)='systemppp0bdevvmnet1\x00'}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000008c0)) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000001c40)='syz0\x00', 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c80)) getpgrp(0x0) gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) socket$unix(0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003200), 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003140)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006580), &(0x7f00000065c0)=0xc) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000980)="42805da0c20f460f46dc0f2e2e41d9bfef000000262edcf6208600cdc176f9cbf3f30f1a7f062900c4a1051586a920ffff0f0f99583da358580606eaf30f53cf973121e079afe0302f450f2e628a99c4c4a1ff741c3f04d6660f3830c1befe8adfe2667e") 19:01:27 executing program 4: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) 19:01:27 executing program 0: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) 19:01:27 executing program 3: lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000006c40)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) eventfd2(0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) r1 = add_key(&(0x7f0000000440)='ceph\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000004c0)="90a0001969250bf8bfad0541f68d3f029d55991b622a0841b1cb94dca1c029e1a3796ae002e04abf18f53e3688820231f2875df5c4f1fab1ef1c06acb8c2b22c256c1ee4c07938b762de33328bea5d9ffff02eb113f3510d4929ffc01deb164daaa46081cc4f0602ce0452456165d4c68d701f30615c6ae930d13a9492dffb6b1f8613f926cbd93f2781795360c4105ec6672da2937e406237c30c75272322802763f8567f46629e250617197c535483c26c1433bb8d4c556bfa35c742562f28315d3362e46e7bf83a2f8e154fe08ad9a6ca8334d7d83580f3f665802dff6c399a3ee2a27a30c9", 0xe7, 0xffffffffffffffff) keyctl$instantiate_iov(0x14, r0, &(0x7f0000000400)=[{&(0x7f0000000380)="f3740cc4095ac1e1cf177e5f20cf3b054d1a00eead04fe2bf16d9ab4a4f6d8d6452bda281bbfbb7127b67d7996605aad3e21cfcc7f1e7c805b7ff847d63bd573cdcd48e0d10e7329e067c35d79ed8572d760cfc7014b611e56f9b8e9c3f71183e3fea0b80d1810d0", 0x68}], 0x1, r1) inotify_init1(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000240)='\x00', 0xffffffffffffffff}, 0x30) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000006c00)='systemppp0bdevvmnet1\x00'}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000008c0)) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000001c40)='syz0\x00', 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c80)) getpgrp(0x0) gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) socket$unix(0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003200), 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003140)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006580), &(0x7f00000065c0)=0xc) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000980)="42805da0c20f460f46dc0f2e2e41d9bfef000000262edcf6208600cdc176f9cbf3f30f1a7f062900c4a1051586a920ffff0f0f99583da358580606eaf30f53cf973121e079afe0302f450f2e628a99c4c4a1ff741c3f04d6660f3830c1befe8adfe2667e") 19:01:28 executing program 1: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) 19:01:28 executing program 4: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) 19:01:28 executing program 2: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) getpgrp(0xffffffffffffffff) 19:01:28 executing program 5: fstat(0xffffffffffffff9c, &(0x7f0000000000)) setfsgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:01:28 executing program 0: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) 19:01:28 executing program 3: lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000006c40)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) eventfd2(0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) r1 = add_key(&(0x7f0000000440)='ceph\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000004c0)="90a0001969250bf8bfad0541f68d3f029d55991b622a0841b1cb94dca1c029e1a3796ae002e04abf18f53e3688820231f2875df5c4f1fab1ef1c06acb8c2b22c256c1ee4c07938b762de33328bea5d9ffff02eb113f3510d4929ffc01deb164daaa46081cc4f0602ce0452456165d4c68d701f30615c6ae930d13a9492dffb6b1f8613f926cbd93f2781795360c4105ec6672da2937e406237c30c75272322802763f8567f46629e250617197c535483c26c1433bb8d4c556bfa35c742562f28315d3362e46e7bf83a2f8e154fe08ad9a6ca8334d7d83580f3f665802dff6c399a3ee2a27a30c9", 0xe7, 0xffffffffffffffff) keyctl$instantiate_iov(0x14, r0, &(0x7f0000000400)=[{&(0x7f0000000380)="f3740cc4095ac1e1cf177e5f20cf3b054d1a00eead04fe2bf16d9ab4a4f6d8d6452bda281bbfbb7127b67d7996605aad3e21cfcc7f1e7c805b7ff847d63bd573cdcd48e0d10e7329e067c35d79ed8572d760cfc7014b611e56f9b8e9c3f71183e3fea0b80d1810d0", 0x68}], 0x1, r1) inotify_init1(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000240)='\x00', 0xffffffffffffffff}, 0x30) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000006c00)='systemppp0bdevvmnet1\x00'}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000008c0)) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000001c40)='syz0\x00', 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c80)) getpgrp(0x0) gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) socket$unix(0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003200), 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003140)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006580), &(0x7f00000065c0)=0xc) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000980)="42805da0c20f460f46dc0f2e2e41d9bfef000000262edcf6208600cdc176f9cbf3f30f1a7f062900c4a1051586a920ffff0f0f99583da358580606eaf30f53cf973121e079afe0302f450f2e628a99c4c4a1ff741c3f04d6660f3830c1befe8adfe2667e") 19:01:28 executing program 1: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) 19:01:29 executing program 4: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) 19:01:29 executing program 4: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) 19:01:29 executing program 5: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) getpgrp(0xffffffffffffffff) 19:01:29 executing program 0: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) 19:01:29 executing program 3: lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000006c40)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) eventfd2(0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) r1 = add_key(&(0x7f0000000440)='ceph\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000004c0)="90a0001969250bf8bfad0541f68d3f029d55991b622a0841b1cb94dca1c029e1a3796ae002e04abf18f53e3688820231f2875df5c4f1fab1ef1c06acb8c2b22c256c1ee4c07938b762de33328bea5d9ffff02eb113f3510d4929ffc01deb164daaa46081cc4f0602ce0452456165d4c68d701f30615c6ae930d13a9492dffb6b1f8613f926cbd93f2781795360c4105ec6672da2937e406237c30c75272322802763f8567f46629e250617197c535483c26c1433bb8d4c556bfa35c742562f28315d3362e46e7bf83a2f8e154fe08ad9a6ca8334d7d83580f3f665802dff6c399a3ee2a27a30c9", 0xe7, 0xffffffffffffffff) keyctl$instantiate_iov(0x14, r0, &(0x7f0000000400)=[{&(0x7f0000000380)="f3740cc4095ac1e1cf177e5f20cf3b054d1a00eead04fe2bf16d9ab4a4f6d8d6452bda281bbfbb7127b67d7996605aad3e21cfcc7f1e7c805b7ff847d63bd573cdcd48e0d10e7329e067c35d79ed8572d760cfc7014b611e56f9b8e9c3f71183e3fea0b80d1810d0", 0x68}], 0x1, r1) inotify_init1(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000240)='\x00', 0xffffffffffffffff}, 0x30) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000006c00)='systemppp0bdevvmnet1\x00'}, 0x10) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000001c40)='syz0\x00', 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c80)) getpgrp(0x0) gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) socket$unix(0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003200), 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003140)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006580), &(0x7f00000065c0)=0xc) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000980)="42805da0c20f460f46dc0f2e2e41d9bfef000000262edcf6208600cdc176f9cbf3f30f1a7f062900c4a1051586a920ffff0f0f99583da358580606eaf30f53cf973121e079afe0302f450f2e628a99c4c4a1ff741c3f04d6660f3830c1befe8adfe2667e") 19:01:29 executing program 1: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) 19:01:30 executing program 4: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) 19:01:30 executing program 2: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) getpgrp(0xffffffffffffffff) 19:01:30 executing program 0: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) 19:01:30 executing program 5: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_get$uid(0x0, 0x0) 19:01:30 executing program 3: lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000006c40)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) eventfd2(0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) r1 = add_key(&(0x7f0000000440)='ceph\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000004c0)="90a0001969250bf8bfad0541f68d3f029d55991b622a0841b1cb94dca1c029e1a3796ae002e04abf18f53e3688820231f2875df5c4f1fab1ef1c06acb8c2b22c256c1ee4c07938b762de33328bea5d9ffff02eb113f3510d4929ffc01deb164daaa46081cc4f0602ce0452456165d4c68d701f30615c6ae930d13a9492dffb6b1f8613f926cbd93f2781795360c4105ec6672da2937e406237c30c75272322802763f8567f46629e250617197c535483c26c1433bb8d4c556bfa35c742562f28315d3362e46e7bf83a2f8e154fe08ad9a6ca8334d7d83580f3f665802dff6c399a3ee2a27a30c9", 0xe7, 0xffffffffffffffff) keyctl$instantiate_iov(0x14, r0, &(0x7f0000000400)=[{&(0x7f0000000380)="f3740cc4095ac1e1cf177e5f20cf3b054d1a00eead04fe2bf16d9ab4a4f6d8d6452bda281bbfbb7127b67d7996605aad3e21cfcc7f1e7c805b7ff847d63bd573cdcd48e0d10e7329e067c35d79ed8572d760cfc7014b611e56f9b8e9c3f71183e3fea0b80d1810d0", 0x68}], 0x1, r1) inotify_init1(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000240)='\x00', 0xffffffffffffffff}, 0x30) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000006c00)='systemppp0bdevvmnet1\x00'}, 0x10) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000001c40)='syz0\x00', 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c80)) getpgrp(0x0) gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) socket$unix(0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003200), 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003140)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006580), &(0x7f00000065c0)=0xc) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000980)="42805da0c20f460f46dc0f2e2e41d9bfef000000262edcf6208600cdc176f9cbf3f30f1a7f062900c4a1051586a920ffff0f0f99583da358580606eaf30f53cf973121e079afe0302f450f2e628a99c4c4a1ff741c3f04d6660f3830c1befe8adfe2667e") 19:01:30 executing program 1: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) 19:01:30 executing program 4: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) 19:01:30 executing program 0: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) 19:01:30 executing program 5: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_get$uid(0x0, 0x0) 19:01:31 executing program 3: lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000006c40)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) eventfd2(0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) r1 = add_key(&(0x7f0000000440)='ceph\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000004c0)="90a0001969250bf8bfad0541f68d3f029d55991b622a0841b1cb94dca1c029e1a3796ae002e04abf18f53e3688820231f2875df5c4f1fab1ef1c06acb8c2b22c256c1ee4c07938b762de33328bea5d9ffff02eb113f3510d4929ffc01deb164daaa46081cc4f0602ce0452456165d4c68d701f30615c6ae930d13a9492dffb6b1f8613f926cbd93f2781795360c4105ec6672da2937e406237c30c75272322802763f8567f46629e250617197c535483c26c1433bb8d4c556bfa35c742562f28315d3362e46e7bf83a2f8e154fe08ad9a6ca8334d7d83580f3f665802dff6c399a3ee2a27a30c9", 0xe7, 0xffffffffffffffff) keyctl$instantiate_iov(0x14, r0, &(0x7f0000000400)=[{&(0x7f0000000380)="f3740cc4095ac1e1cf177e5f20cf3b054d1a00eead04fe2bf16d9ab4a4f6d8d6452bda281bbfbb7127b67d7996605aad3e21cfcc7f1e7c805b7ff847d63bd573cdcd48e0d10e7329e067c35d79ed8572d760cfc7014b611e56f9b8e9c3f71183e3fea0b80d1810d0", 0x68}], 0x1, r1) inotify_init1(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000240)='\x00', 0xffffffffffffffff}, 0x30) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000006c00)='systemppp0bdevvmnet1\x00'}, 0x10) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000001c40)='syz0\x00', 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c80)) getpgrp(0x0) gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) socket$unix(0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003200), 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003140)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006580), &(0x7f00000065c0)=0xc) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000980)="42805da0c20f460f46dc0f2e2e41d9bfef000000262edcf6208600cdc176f9cbf3f30f1a7f062900c4a1051586a920ffff0f0f99583da358580606eaf30f53cf973121e079afe0302f450f2e628a99c4c4a1ff741c3f04d6660f3830c1befe8adfe2667e") 19:01:31 executing program 1: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) 19:01:31 executing program 4: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) 19:01:31 executing program 5: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_get$uid(0x0, 0x0) 19:01:32 executing program 2: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) getpgrp(0xffffffffffffffff) 19:01:32 executing program 0: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) 19:01:32 executing program 3: lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000006c40)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) eventfd2(0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) r1 = add_key(&(0x7f0000000440)='ceph\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000004c0)="90a0001969250bf8bfad0541f68d3f029d55991b622a0841b1cb94dca1c029e1a3796ae002e04abf18f53e3688820231f2875df5c4f1fab1ef1c06acb8c2b22c256c1ee4c07938b762de33328bea5d9ffff02eb113f3510d4929ffc01deb164daaa46081cc4f0602ce0452456165d4c68d701f30615c6ae930d13a9492dffb6b1f8613f926cbd93f2781795360c4105ec6672da2937e406237c30c75272322802763f8567f46629e250617197c535483c26c1433bb8d4c556bfa35c742562f28315d3362e46e7bf83a2f8e154fe08ad9a6ca8334d7d83580f3f665802dff6c399a3ee2a27a30c9", 0xe7, 0xffffffffffffffff) keyctl$instantiate_iov(0x14, r0, &(0x7f0000000400)=[{&(0x7f0000000380)="f3740cc4095ac1e1cf177e5f20cf3b054d1a00eead04fe2bf16d9ab4a4f6d8d6452bda281bbfbb7127b67d7996605aad3e21cfcc7f1e7c805b7ff847d63bd573cdcd48e0d10e7329e067c35d79ed8572d760cfc7014b611e56f9b8e9c3f71183e3fea0b80d1810d0", 0x68}], 0x1, r1) inotify_init1(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000240)='\x00', 0xffffffffffffffff}, 0x30) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000008c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000001c40)='syz0\x00', 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c80)) getpgrp(0x0) gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) socket$unix(0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003200), 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003140)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006580), &(0x7f00000065c0)=0xc) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000980)="42805da0c20f460f46dc0f2e2e41d9bfef000000262edcf6208600cdc176f9cbf3f30f1a7f062900c4a1051586a920ffff0f0f99583da358580606eaf30f53cf973121e079afe0302f450f2e628a99c4c4a1ff741c3f04d6660f3830c1befe8adfe2667e") 19:01:32 executing program 1: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) 19:01:32 executing program 4: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) 19:01:32 executing program 5: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:01:32 executing program 1: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) 19:01:33 executing program 0: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) 19:01:33 executing program 4: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) 19:01:33 executing program 5: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:01:33 executing program 1: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) 19:01:33 executing program 3: lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000006c40)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) eventfd2(0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) r1 = add_key(&(0x7f0000000440)='ceph\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000004c0)="90a0001969250bf8bfad0541f68d3f029d55991b622a0841b1cb94dca1c029e1a3796ae002e04abf18f53e3688820231f2875df5c4f1fab1ef1c06acb8c2b22c256c1ee4c07938b762de33328bea5d9ffff02eb113f3510d4929ffc01deb164daaa46081cc4f0602ce0452456165d4c68d701f30615c6ae930d13a9492dffb6b1f8613f926cbd93f2781795360c4105ec6672da2937e406237c30c75272322802763f8567f46629e250617197c535483c26c1433bb8d4c556bfa35c742562f28315d3362e46e7bf83a2f8e154fe08ad9a6ca8334d7d83580f3f665802dff6c399a3ee2a27a30c9", 0xe7, 0xffffffffffffffff) keyctl$instantiate_iov(0x14, r0, &(0x7f0000000400)=[{&(0x7f0000000380)="f3740cc4095ac1e1cf177e5f20cf3b054d1a00eead04fe2bf16d9ab4a4f6d8d6452bda281bbfbb7127b67d7996605aad3e21cfcc7f1e7c805b7ff847d63bd573cdcd48e0d10e7329e067c35d79ed8572d760cfc7014b611e56f9b8e9c3f71183e3fea0b80d1810d0", 0x68}], 0x1, r1) inotify_init1(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000240)='\x00', 0xffffffffffffffff}, 0x30) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000008c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000001c40)='syz0\x00', 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c80)) getpgrp(0x0) gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) socket$unix(0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003200), 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003140)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006580), &(0x7f00000065c0)=0xc) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000980)="42805da0c20f460f46dc0f2e2e41d9bfef000000262edcf6208600cdc176f9cbf3f30f1a7f062900c4a1051586a920ffff0f0f99583da358580606eaf30f53cf973121e079afe0302f450f2e628a99c4c4a1ff741c3f04d6660f3830c1befe8adfe2667e") 19:01:33 executing program 2: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) getpgrp(0xffffffffffffffff) 19:01:33 executing program 1: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) 19:01:34 executing program 1: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) 19:01:34 executing program 1: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) 19:01:34 executing program 0: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) 19:01:34 executing program 1: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) 19:01:34 executing program 4: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) 19:01:34 executing program 5: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:01:34 executing program 3: lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000006c40)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) eventfd2(0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) r1 = add_key(&(0x7f0000000440)='ceph\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000004c0)="90a0001969250bf8bfad0541f68d3f029d55991b622a0841b1cb94dca1c029e1a3796ae002e04abf18f53e3688820231f2875df5c4f1fab1ef1c06acb8c2b22c256c1ee4c07938b762de33328bea5d9ffff02eb113f3510d4929ffc01deb164daaa46081cc4f0602ce0452456165d4c68d701f30615c6ae930d13a9492dffb6b1f8613f926cbd93f2781795360c4105ec6672da2937e406237c30c75272322802763f8567f46629e250617197c535483c26c1433bb8d4c556bfa35c742562f28315d3362e46e7bf83a2f8e154fe08ad9a6ca8334d7d83580f3f665802dff6c399a3ee2a27a30c9", 0xe7, 0xffffffffffffffff) keyctl$instantiate_iov(0x14, r0, &(0x7f0000000400)=[{&(0x7f0000000380)="f3740cc4095ac1e1cf177e5f20cf3b054d1a00eead04fe2bf16d9ab4a4f6d8d6452bda281bbfbb7127b67d7996605aad3e21cfcc7f1e7c805b7ff847d63bd573cdcd48e0d10e7329e067c35d79ed8572d760cfc7014b611e56f9b8e9c3f71183e3fea0b80d1810d0", 0x68}], 0x1, r1) inotify_init1(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000240)='\x00', 0xffffffffffffffff}, 0x30) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000008c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000001c40)='syz0\x00', 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c80)) getpgrp(0x0) gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) socket$unix(0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003200), 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003140)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006580), &(0x7f00000065c0)=0xc) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000980)="42805da0c20f460f46dc0f2e2e41d9bfef000000262edcf6208600cdc176f9cbf3f30f1a7f062900c4a1051586a920ffff0f0f99583da358580606eaf30f53cf973121e079afe0302f450f2e628a99c4c4a1ff741c3f04d6660f3830c1befe8adfe2667e") 19:01:35 executing program 0: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) 19:01:35 executing program 4: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) 19:01:35 executing program 5: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) ioprio_get$uid(0x0, 0x0) 19:01:35 executing program 2: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) getpgrp(0xffffffffffffffff) 19:01:35 executing program 1: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) 19:01:35 executing program 3: lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000006c40)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) eventfd2(0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) r1 = add_key(&(0x7f0000000440)='ceph\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000004c0)="90a0001969250bf8bfad0541f68d3f029d55991b622a0841b1cb94dca1c029e1a3796ae002e04abf18f53e3688820231f2875df5c4f1fab1ef1c06acb8c2b22c256c1ee4c07938b762de33328bea5d9ffff02eb113f3510d4929ffc01deb164daaa46081cc4f0602ce0452456165d4c68d701f30615c6ae930d13a9492dffb6b1f8613f926cbd93f2781795360c4105ec6672da2937e406237c30c75272322802763f8567f46629e250617197c535483c26c1433bb8d4c556bfa35c742562f28315d3362e46e7bf83a2f8e154fe08ad9a6ca8334d7d83580f3f665802dff6c399a3ee2a27a30c9", 0xe7, 0xffffffffffffffff) keyctl$instantiate_iov(0x14, r0, &(0x7f0000000400)=[{&(0x7f0000000380)="f3740cc4095ac1e1cf177e5f20cf3b054d1a00eead04fe2bf16d9ab4a4f6d8d6452bda281bbfbb7127b67d7996605aad3e21cfcc7f1e7c805b7ff847d63bd573cdcd48e0d10e7329e067c35d79ed8572d760cfc7014b611e56f9b8e9c3f71183e3fea0b80d1810d0", 0x68}], 0x1, r1) inotify_init1(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000240)='\x00', 0xffffffffffffffff}, 0x30) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000006c00)='systemppp0bdevvmnet1\x00'}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000008c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000001c40)='syz0\x00', 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c80)) getpgrp(0x0) gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) socket$unix(0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003200), 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003140)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006580), &(0x7f00000065c0)=0xc) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000980)="42805da0c20f460f46dc0f2e2e41d9bfef000000262edcf6208600cdc176f9cbf3f30f1a7f062900c4a1051586a920ffff0f0f99583da358580606eaf30f53cf973121e079afe0302f450f2e628a99c4c4a1ff741c3f04d6660f3830c1befe8adfe2667e") 19:01:35 executing program 5: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) ioprio_get$uid(0x0, 0x0) 19:01:35 executing program 3: lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000006c40)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) eventfd2(0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) r1 = add_key(&(0x7f0000000440)='ceph\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000004c0)="90a0001969250bf8bfad0541f68d3f029d55991b622a0841b1cb94dca1c029e1a3796ae002e04abf18f53e3688820231f2875df5c4f1fab1ef1c06acb8c2b22c256c1ee4c07938b762de33328bea5d9ffff02eb113f3510d4929ffc01deb164daaa46081cc4f0602ce0452456165d4c68d701f30615c6ae930d13a9492dffb6b1f8613f926cbd93f2781795360c4105ec6672da2937e406237c30c75272322802763f8567f46629e250617197c535483c26c1433bb8d4c556bfa35c742562f28315d3362e46e7bf83a2f8e154fe08ad9a6ca8334d7d83580f3f665802dff6c399a3ee2a27a30c9", 0xe7, 0xffffffffffffffff) keyctl$instantiate_iov(0x14, r0, &(0x7f0000000400)=[{&(0x7f0000000380)="f3740cc4095ac1e1cf177e5f20cf3b054d1a00eead04fe2bf16d9ab4a4f6d8d6452bda281bbfbb7127b67d7996605aad3e21cfcc7f1e7c805b7ff847d63bd573cdcd48e0d10e7329e067c35d79ed8572d760cfc7014b611e56f9b8e9c3f71183e3fea0b80d1810d0", 0x68}], 0x1, r1) inotify_init1(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000240)='\x00', 0xffffffffffffffff}, 0x30) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000006c00)='systemppp0bdevvmnet1\x00'}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000008c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000001c40)='syz0\x00', 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c80)) getpgrp(0x0) gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) socket$unix(0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003200), 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003140)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006580), &(0x7f00000065c0)=0xc) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000980)="42805da0c20f460f46dc0f2e2e41d9bfef000000262edcf6208600cdc176f9cbf3f30f1a7f062900c4a1051586a920ffff0f0f99583da358580606eaf30f53cf973121e079afe0302f450f2e628a99c4c4a1ff741c3f04d6660f3830c1befe8adfe2667e") 19:01:35 executing program 3: lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000006c40)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) eventfd2(0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) r1 = add_key(&(0x7f0000000440)='ceph\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000004c0)="90a0001969250bf8bfad0541f68d3f029d55991b622a0841b1cb94dca1c029e1a3796ae002e04abf18f53e3688820231f2875df5c4f1fab1ef1c06acb8c2b22c256c1ee4c07938b762de33328bea5d9ffff02eb113f3510d4929ffc01deb164daaa46081cc4f0602ce0452456165d4c68d701f30615c6ae930d13a9492dffb6b1f8613f926cbd93f2781795360c4105ec6672da2937e406237c30c75272322802763f8567f46629e250617197c535483c26c1433bb8d4c556bfa35c742562f28315d3362e46e7bf83a2f8e154fe08ad9a6ca8334d7d83580f3f665802dff6c399a3ee2a27a30c9", 0xe7, 0xffffffffffffffff) keyctl$instantiate_iov(0x14, r0, &(0x7f0000000400)=[{&(0x7f0000000380)="f3740cc4095ac1e1cf177e5f20cf3b054d1a00eead04fe2bf16d9ab4a4f6d8d6452bda281bbfbb7127b67d7996605aad3e21cfcc7f1e7c805b7ff847d63bd573cdcd48e0d10e7329e067c35d79ed8572d760cfc7014b611e56f9b8e9c3f71183e3fea0b80d1810d0", 0x68}], 0x1, r1) inotify_init1(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000240)='\x00', 0xffffffffffffffff}, 0x30) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000006c00)='systemppp0bdevvmnet1\x00'}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000008c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000001c40)='syz0\x00', 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c80)) getpgrp(0x0) gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) socket$unix(0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003200), 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003140)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006580), &(0x7f00000065c0)=0xc) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000980)="42805da0c20f460f46dc0f2e2e41d9bfef000000262edcf6208600cdc176f9cbf3f30f1a7f062900c4a1051586a920ffff0f0f99583da358580606eaf30f53cf973121e079afe0302f450f2e628a99c4c4a1ff741c3f04d6660f3830c1befe8adfe2667e") 19:01:35 executing program 3: lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000006c40)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) eventfd2(0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) r1 = add_key(&(0x7f0000000440)='ceph\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000004c0)="90a0001969250bf8bfad0541f68d3f029d55991b622a0841b1cb94dca1c029e1a3796ae002e04abf18f53e3688820231f2875df5c4f1fab1ef1c06acb8c2b22c256c1ee4c07938b762de33328bea5d9ffff02eb113f3510d4929ffc01deb164daaa46081cc4f0602ce0452456165d4c68d701f30615c6ae930d13a9492dffb6b1f8613f926cbd93f2781795360c4105ec6672da2937e406237c30c75272322802763f8567f46629e250617197c535483c26c1433bb8d4c556bfa35c742562f28315d3362e46e7bf83a2f8e154fe08ad9a6ca8334d7d83580f3f665802dff6c399a3ee2a27a30c9", 0xe7, 0xffffffffffffffff) keyctl$instantiate_iov(0x14, r0, &(0x7f0000000400)=[{&(0x7f0000000380)="f3740cc4095ac1e1cf177e5f20cf3b054d1a00eead04fe2bf16d9ab4a4f6d8d6452bda281bbfbb7127b67d7996605aad3e21cfcc7f1e7c805b7ff847d63bd573cdcd48e0d10e7329e067c35d79ed8572d760cfc7014b611e56f9b8e9c3f71183e3fea0b80d1810d0", 0x68}], 0x1, r1) inotify_init1(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000240)='\x00', 0xffffffffffffffff}, 0x30) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000006c00)='systemppp0bdevvmnet1\x00'}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000008c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000001c40)='syz0\x00', 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c80)) getpgrp(0x0) gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) socket$unix(0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003200), 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003140)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006580), &(0x7f00000065c0)=0xc) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000980)="42805da0c20f460f46dc0f2e2e41d9bfef000000262edcf6208600cdc176f9cbf3f30f1a7f062900c4a1051586a920ffff0f0f99583da358580606eaf30f53cf973121e079afe0302f450f2e628a99c4c4a1ff741c3f04d6660f3830c1befe8adfe2667e") 19:01:35 executing program 5: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) ioprio_get$uid(0x0, 0x0) 19:01:35 executing program 5: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_get$uid(0x0, 0x0) 19:01:35 executing program 0: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) 19:01:35 executing program 4: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) 19:01:35 executing program 0: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) 19:01:37 executing program 2: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) getpgrp(0xffffffffffffffff) 19:01:37 executing program 0: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) 19:01:37 executing program 1: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) 19:01:37 executing program 3: lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000006c40)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) eventfd2(0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) r1 = add_key(&(0x7f0000000440)='ceph\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000004c0)="90a0001969250bf8bfad0541f68d3f029d55991b622a0841b1cb94dca1c029e1a3796ae002e04abf18f53e3688820231f2875df5c4f1fab1ef1c06acb8c2b22c256c1ee4c07938b762de33328bea5d9ffff02eb113f3510d4929ffc01deb164daaa46081cc4f0602ce0452456165d4c68d701f30615c6ae930d13a9492dffb6b1f8613f926cbd93f2781795360c4105ec6672da2937e406237c30c75272322802763f8567f46629e250617197c535483c26c1433bb8d4c556bfa35c742562f28315d3362e46e7bf83a2f8e154fe08ad9a6ca8334d7d83580f3f665802dff6c399a3ee2a27a30c9", 0xe7, 0xffffffffffffffff) keyctl$instantiate_iov(0x14, r0, &(0x7f0000000400)=[{&(0x7f0000000380)="f3740cc4095ac1e1cf177e5f20cf3b054d1a00eead04fe2bf16d9ab4a4f6d8d6452bda281bbfbb7127b67d7996605aad3e21cfcc7f1e7c805b7ff847d63bd573cdcd48e0d10e7329e067c35d79ed8572d760cfc7014b611e56f9b8e9c3f71183e3fea0b80d1810d0", 0x68}], 0x1, r1) inotify_init1(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000240)='\x00', 0xffffffffffffffff}, 0x30) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000006c00)='systemppp0bdevvmnet1\x00'}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000008c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000001c40)='syz0\x00', 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c80)) getpgrp(0x0) gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) socket$unix(0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003200), 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003140)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006580), &(0x7f00000065c0)=0xc) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000980)="42805da0c20f460f46dc0f2e2e41d9bfef000000262edcf6208600cdc176f9cbf3f30f1a7f062900c4a1051586a920ffff0f0f99583da358580606eaf30f53cf973121e079afe0302f450f2e628a99c4c4a1ff741c3f04d6660f3830c1befe8adfe2667e") 19:01:37 executing program 5: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_get$uid(0x0, 0x0) 19:01:37 executing program 4: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) 19:01:37 executing program 4: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) 19:01:37 executing program 0: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) 19:01:37 executing program 4: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) 19:01:37 executing program 0: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) 19:01:37 executing program 0: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) 19:01:37 executing program 4: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) 19:01:38 executing program 2: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) getpgrp(0xffffffffffffffff) 19:01:38 executing program 0: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) 19:01:38 executing program 4: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) 19:01:38 executing program 5: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_get$uid(0x0, 0x0) 19:01:38 executing program 1: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) 19:01:38 executing program 3: lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000006c40)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) eventfd2(0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) r1 = add_key(&(0x7f0000000440)='ceph\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000004c0)="90a0001969250bf8bfad0541f68d3f029d55991b622a0841b1cb94dca1c029e1a3796ae002e04abf18f53e3688820231f2875df5c4f1fab1ef1c06acb8c2b22c256c1ee4c07938b762de33328bea5d9ffff02eb113f3510d4929ffc01deb164daaa46081cc4f0602ce0452456165d4c68d701f30615c6ae930d13a9492dffb6b1f8613f926cbd93f2781795360c4105ec6672da2937e406237c30c75272322802763f8567f46629e250617197c535483c26c1433bb8d4c556bfa35c742562f28315d3362e46e7bf83a2f8e154fe08ad9a6ca8334d7d83580f3f665802dff6c399a3ee2a27a30c9", 0xe7, 0xffffffffffffffff) keyctl$instantiate_iov(0x14, r0, &(0x7f0000000400)=[{&(0x7f0000000380)="f3740cc4095ac1e1cf177e5f20cf3b054d1a00eead04fe2bf16d9ab4a4f6d8d6452bda281bbfbb7127b67d7996605aad3e21cfcc7f1e7c805b7ff847d63bd573cdcd48e0d10e7329e067c35d79ed8572d760cfc7014b611e56f9b8e9c3f71183e3fea0b80d1810d0", 0x68}], 0x1, r1) inotify_init1(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000240)='\x00', 0xffffffffffffffff}, 0x30) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000006c00)='systemppp0bdevvmnet1\x00'}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000008c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000001c40)='syz0\x00', 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c80)) getpgrp(0x0) gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) socket$unix(0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003200), 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003140)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006580), &(0x7f00000065c0)=0xc) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000980)="42805da0c20f460f46dc0f2e2e41d9bfef000000262edcf6208600cdc176f9cbf3f30f1a7f062900c4a1051586a920ffff0f0f99583da358580606eaf30f53cf973121e079afe0302f450f2e628a99c4c4a1ff741c3f04d6660f3830c1befe8adfe2667e") 19:01:38 executing program 4: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) 19:01:38 executing program 0: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) 19:01:38 executing program 4: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) 19:01:38 executing program 0: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) 19:01:38 executing program 0: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) 19:01:38 executing program 4: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) 19:01:39 executing program 2: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) getpgrp(0xffffffffffffffff) 19:01:39 executing program 4: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) 19:01:39 executing program 5: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_get$uid(0x0, 0x0) 19:01:39 executing program 0: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) 19:01:39 executing program 1: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) 19:01:39 executing program 3: lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000006c40)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) eventfd2(0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) r1 = add_key(&(0x7f0000000440)='ceph\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000004c0)="90a0001969250bf8bfad0541f68d3f029d55991b622a0841b1cb94dca1c029e1a3796ae002e04abf18f53e3688820231f2875df5c4f1fab1ef1c06acb8c2b22c256c1ee4c07938b762de33328bea5d9ffff02eb113f3510d4929ffc01deb164daaa46081cc4f0602ce0452456165d4c68d701f30615c6ae930d13a9492dffb6b1f8613f926cbd93f2781795360c4105ec6672da2937e406237c30c75272322802763f8567f46629e250617197c535483c26c1433bb8d4c556bfa35c742562f28315d3362e46e7bf83a2f8e154fe08ad9a6ca8334d7d83580f3f665802dff6c399a3ee2a27a30c9", 0xe7, 0xffffffffffffffff) keyctl$instantiate_iov(0x14, r0, &(0x7f0000000400)=[{&(0x7f0000000380)="f3740cc4095ac1e1cf177e5f20cf3b054d1a00eead04fe2bf16d9ab4a4f6d8d6452bda281bbfbb7127b67d7996605aad3e21cfcc7f1e7c805b7ff847d63bd573cdcd48e0d10e7329e067c35d79ed8572d760cfc7014b611e56f9b8e9c3f71183e3fea0b80d1810d0", 0x68}], 0x1, r1) inotify_init1(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000240)='\x00', 0xffffffffffffffff}, 0x30) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000006c00)='systemppp0bdevvmnet1\x00'}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000008c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000001c40)='syz0\x00', 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c80)) getpgrp(0x0) gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) socket$unix(0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003200), 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003140)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006580), &(0x7f00000065c0)=0xc) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000980)="42805da0c20f460f46dc0f2e2e41d9bfef000000262edcf6208600cdc176f9cbf3f30f1a7f062900c4a1051586a920ffff0f0f99583da358580606eaf30f53cf973121e079afe0302f450f2e628a99c4c4a1ff741c3f04d6660f3830c1befe8adfe2667e") 19:01:39 executing program 4: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) 19:01:40 executing program 0: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) 19:01:40 executing program 1: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) 19:01:40 executing program 4: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) 19:01:40 executing program 5: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_get$uid(0x0, 0x0) 19:01:40 executing program 3: lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000006c40)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) eventfd2(0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) r1 = add_key(&(0x7f0000000440)='ceph\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000004c0)="90a0001969250bf8bfad0541f68d3f029d55991b622a0841b1cb94dca1c029e1a3796ae002e04abf18f53e3688820231f2875df5c4f1fab1ef1c06acb8c2b22c256c1ee4c07938b762de33328bea5d9ffff02eb113f3510d4929ffc01deb164daaa46081cc4f0602ce0452456165d4c68d701f30615c6ae930d13a9492dffb6b1f8613f926cbd93f2781795360c4105ec6672da2937e406237c30c75272322802763f8567f46629e250617197c535483c26c1433bb8d4c556bfa35c742562f28315d3362e46e7bf83a2f8e154fe08ad9a6ca8334d7d83580f3f665802dff6c399a3ee2a27a30c9", 0xe7, 0xffffffffffffffff) keyctl$instantiate_iov(0x14, r0, &(0x7f0000000400)=[{&(0x7f0000000380)="f3740cc4095ac1e1cf177e5f20cf3b054d1a00eead04fe2bf16d9ab4a4f6d8d6452bda281bbfbb7127b67d7996605aad3e21cfcc7f1e7c805b7ff847d63bd573cdcd48e0d10e7329e067c35d79ed8572d760cfc7014b611e56f9b8e9c3f71183e3fea0b80d1810d0", 0x68}], 0x1, r1) inotify_init1(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000240)='\x00', 0xffffffffffffffff}, 0x30) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000006c00)='systemppp0bdevvmnet1\x00'}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000008c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000001c40)='syz0\x00', 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c80)) getpgrp(0x0) gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) socket$unix(0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003200), 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003140)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006580), &(0x7f00000065c0)=0xc) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000980)="42805da0c20f460f46dc0f2e2e41d9bfef000000262edcf6208600cdc176f9cbf3f30f1a7f062900c4a1051586a920ffff0f0f99583da358580606eaf30f53cf973121e079afe0302f450f2e628a99c4c4a1ff741c3f04d6660f3830c1befe8adfe2667e") 19:01:40 executing program 2: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) getpgrp(0xffffffffffffffff) 19:01:41 executing program 0: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:01:41 executing program 5: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_get$uid(0x0, 0x0) 19:01:41 executing program 4: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) 19:01:41 executing program 1: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) 19:01:41 executing program 3: lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000006c40)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) eventfd2(0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) r1 = add_key(&(0x7f0000000440)='ceph\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000004c0)="90a0001969250bf8bfad0541f68d3f029d55991b622a0841b1cb94dca1c029e1a3796ae002e04abf18f53e3688820231f2875df5c4f1fab1ef1c06acb8c2b22c256c1ee4c07938b762de33328bea5d9ffff02eb113f3510d4929ffc01deb164daaa46081cc4f0602ce0452456165d4c68d701f30615c6ae930d13a9492dffb6b1f8613f926cbd93f2781795360c4105ec6672da2937e406237c30c75272322802763f8567f46629e250617197c535483c26c1433bb8d4c556bfa35c742562f28315d3362e46e7bf83a2f8e154fe08ad9a6ca8334d7d83580f3f665802dff6c399a3ee2a27a30c9", 0xe7, 0xffffffffffffffff) keyctl$instantiate_iov(0x14, r0, &(0x7f0000000400)=[{&(0x7f0000000380)="f3740cc4095ac1e1cf177e5f20cf3b054d1a00eead04fe2bf16d9ab4a4f6d8d6452bda281bbfbb7127b67d7996605aad3e21cfcc7f1e7c805b7ff847d63bd573cdcd48e0d10e7329e067c35d79ed8572d760cfc7014b611e56f9b8e9c3f71183e3fea0b80d1810d0", 0x68}], 0x1, r1) inotify_init1(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000240)='\x00', 0xffffffffffffffff}, 0x30) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000006c00)='systemppp0bdevvmnet1\x00'}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000008c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000001c40)='syz0\x00', 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c80)) getpgrp(0x0) gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) socket$unix(0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003200), 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003140)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006580), &(0x7f00000065c0)=0xc) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000980)="42805da0c20f460f46dc0f2e2e41d9bfef000000262edcf6208600cdc176f9cbf3f30f1a7f062900c4a1051586a920ffff0f0f99583da358580606eaf30f53cf973121e079afe0302f450f2e628a99c4c4a1ff741c3f04d6660f3830c1befe8adfe2667e") 19:01:41 executing program 5: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_get$uid(0x0, 0x0) 19:01:41 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x3, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") 19:01:41 executing program 0: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:01:42 executing program 3: lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000006c40)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) eventfd2(0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) r1 = add_key(&(0x7f0000000440)='ceph\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000004c0)="90a0001969250bf8bfad0541f68d3f029d55991b622a0841b1cb94dca1c029e1a3796ae002e04abf18f53e3688820231f2875df5c4f1fab1ef1c06acb8c2b22c256c1ee4c07938b762de33328bea5d9ffff02eb113f3510d4929ffc01deb164daaa46081cc4f0602ce0452456165d4c68d701f30615c6ae930d13a9492dffb6b1f8613f926cbd93f2781795360c4105ec6672da2937e406237c30c75272322802763f8567f46629e250617197c535483c26c1433bb8d4c556bfa35c742562f28315d3362e46e7bf83a2f8e154fe08ad9a6ca8334d7d83580f3f665802dff6c399a3ee2a27a30c9", 0xe7, 0xffffffffffffffff) keyctl$instantiate_iov(0x14, r0, &(0x7f0000000400)=[{&(0x7f0000000380)="f3740cc4095ac1e1cf177e5f20cf3b054d1a00eead04fe2bf16d9ab4a4f6d8d6452bda281bbfbb7127b67d7996605aad3e21cfcc7f1e7c805b7ff847d63bd573cdcd48e0d10e7329e067c35d79ed8572d760cfc7014b611e56f9b8e9c3f71183e3fea0b80d1810d0", 0x68}], 0x1, r1) inotify_init1(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000240)='\x00', 0xffffffffffffffff}, 0x30) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000006c00)='systemppp0bdevvmnet1\x00'}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000008c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000001c40)='syz0\x00', 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c80)) getpgrp(0x0) gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) socket$unix(0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003200), 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003140)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006580), &(0x7f00000065c0)=0xc) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000980)="42805da0c20f460f46dc0f2e2e41d9bfef000000262edcf6208600cdc176f9cbf3f30f1a7f062900c4a1051586a920ffff0f0f99583da358580606eaf30f53cf973121e079afe0302f450f2e628a99c4c4a1ff741c3f04d6660f3830c1befe8adfe2667e") 19:01:42 executing program 3: lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000006c40)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) eventfd2(0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) r1 = add_key(&(0x7f0000000440)='ceph\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000004c0)="90a0001969250bf8bfad0541f68d3f029d55991b622a0841b1cb94dca1c029e1a3796ae002e04abf18f53e3688820231f2875df5c4f1fab1ef1c06acb8c2b22c256c1ee4c07938b762de33328bea5d9ffff02eb113f3510d4929ffc01deb164daaa46081cc4f0602ce0452456165d4c68d701f30615c6ae930d13a9492dffb6b1f8613f926cbd93f2781795360c4105ec6672da2937e406237c30c75272322802763f8567f46629e250617197c535483c26c1433bb8d4c556bfa35c742562f28315d3362e46e7bf83a2f8e154fe08ad9a6ca8334d7d83580f3f665802dff6c399a3ee2a27a30c9", 0xe7, 0xffffffffffffffff) keyctl$instantiate_iov(0x14, r0, &(0x7f0000000400)=[{&(0x7f0000000380)="f3740cc4095ac1e1cf177e5f20cf3b054d1a00eead04fe2bf16d9ab4a4f6d8d6452bda281bbfbb7127b67d7996605aad3e21cfcc7f1e7c805b7ff847d63bd573cdcd48e0d10e7329e067c35d79ed8572d760cfc7014b611e56f9b8e9c3f71183e3fea0b80d1810d0", 0x68}], 0x1, r1) inotify_init1(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000240)='\x00', 0xffffffffffffffff}, 0x30) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000006c00)='systemppp0bdevvmnet1\x00'}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000008c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000001c40)='syz0\x00', 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c80)) getpgrp(0x0) gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) socket$unix(0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003200), 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003140)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006580), &(0x7f00000065c0)=0xc) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000980)="42805da0c20f460f46dc0f2e2e41d9bfef000000262edcf6208600cdc176f9cbf3f30f1a7f062900c4a1051586a920ffff0f0f99583da358580606eaf30f53cf973121e079afe0302f450f2e628a99c4c4a1ff741c3f04d6660f3830c1befe8adfe2667e") 19:01:42 executing program 1: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) 19:01:42 executing program 2: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) getpgrp(0xffffffffffffffff) 19:01:42 executing program 5: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_get$uid(0x0, 0x0) 19:01:42 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x3, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") 19:01:42 executing program 0: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:01:43 executing program 3: lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000006c40)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) eventfd2(0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) r1 = add_key(&(0x7f0000000440)='ceph\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000004c0)="90a0001969250bf8bfad0541f68d3f029d55991b622a0841b1cb94dca1c029e1a3796ae002e04abf18f53e3688820231f2875df5c4f1fab1ef1c06acb8c2b22c256c1ee4c07938b762de33328bea5d9ffff02eb113f3510d4929ffc01deb164daaa46081cc4f0602ce0452456165d4c68d701f30615c6ae930d13a9492dffb6b1f8613f926cbd93f2781795360c4105ec6672da2937e406237c30c75272322802763f8567f46629e250617197c535483c26c1433bb8d4c556bfa35c742562f28315d3362e46e7bf83a2f8e154fe08ad9a6ca8334d7d83580f3f665802dff6c399a3ee2a27a30c9", 0xe7, 0xffffffffffffffff) keyctl$instantiate_iov(0x14, r0, &(0x7f0000000400)=[{&(0x7f0000000380)="f3740cc4095ac1e1cf177e5f20cf3b054d1a00eead04fe2bf16d9ab4a4f6d8d6452bda281bbfbb7127b67d7996605aad3e21cfcc7f1e7c805b7ff847d63bd573cdcd48e0d10e7329e067c35d79ed8572d760cfc7014b611e56f9b8e9c3f71183e3fea0b80d1810d0", 0x68}], 0x1, r1) inotify_init1(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000240)='\x00', 0xffffffffffffffff}, 0x30) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000006c00)='systemppp0bdevvmnet1\x00'}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000008c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000001c40)='syz0\x00', 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c80)) getpgrp(0x0) gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) socket$unix(0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003200), 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003140)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006580), &(0x7f00000065c0)=0xc) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000980)="42805da0c20f460f46dc0f2e2e41d9bfef000000262edcf6208600cdc176f9cbf3f30f1a7f062900c4a1051586a920ffff0f0f99583da358580606eaf30f53cf973121e079afe0302f450f2e628a99c4c4a1ff741c3f04d6660f3830c1befe8adfe2667e") 19:01:43 executing program 1: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) 19:01:43 executing program 5: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_get$uid(0x0, 0x0) 19:01:43 executing program 0: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) 19:01:43 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x3, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") 19:01:43 executing program 0: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) 19:01:44 executing program 3: lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000006c40)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) eventfd2(0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) r1 = add_key(&(0x7f0000000440)='ceph\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000004c0)="90a0001969250bf8bfad0541f68d3f029d55991b622a0841b1cb94dca1c029e1a3796ae002e04abf18f53e3688820231f2875df5c4f1fab1ef1c06acb8c2b22c256c1ee4c07938b762de33328bea5d9ffff02eb113f3510d4929ffc01deb164daaa46081cc4f0602ce0452456165d4c68d701f30615c6ae930d13a9492dffb6b1f8613f926cbd93f2781795360c4105ec6672da2937e406237c30c75272322802763f8567f46629e250617197c535483c26c1433bb8d4c556bfa35c742562f28315d3362e46e7bf83a2f8e154fe08ad9a6ca8334d7d83580f3f665802dff6c399a3ee2a27a30c9", 0xe7, 0xffffffffffffffff) keyctl$instantiate_iov(0x14, r0, &(0x7f0000000400)=[{&(0x7f0000000380)="f3740cc4095ac1e1cf177e5f20cf3b054d1a00eead04fe2bf16d9ab4a4f6d8d6452bda281bbfbb7127b67d7996605aad3e21cfcc7f1e7c805b7ff847d63bd573cdcd48e0d10e7329e067c35d79ed8572d760cfc7014b611e56f9b8e9c3f71183e3fea0b80d1810d0", 0x68}], 0x1, r1) inotify_init1(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000240)='\x00', 0xffffffffffffffff}, 0x30) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000006c00)='systemppp0bdevvmnet1\x00'}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000008c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000001c40)='syz0\x00', 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c80)) getpgrp(0x0) gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) socket$unix(0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003200), 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003140)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006580), &(0x7f00000065c0)=0xc) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000980)="42805da0c20f460f46dc0f2e2e41d9bfef000000262edcf6208600cdc176f9cbf3f30f1a7f062900c4a1051586a920ffff0f0f99583da358580606eaf30f53cf973121e079afe0302f450f2e628a99c4c4a1ff741c3f04d6660f3830c1befe8adfe2667e") 19:01:44 executing program 0: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) 19:01:44 executing program 2: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) getpgrp(0xffffffffffffffff) 19:01:44 executing program 1: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) 19:01:44 executing program 5: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_get$uid(0x0, 0x0) 19:01:44 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x3, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) 19:01:44 executing program 0: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:01:45 executing program 3: lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000006c40)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) eventfd2(0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) r1 = add_key(&(0x7f0000000440)='ceph\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000004c0)="90a0001969250bf8bfad0541f68d3f029d55991b622a0841b1cb94dca1c029e1a3796ae002e04abf18f53e3688820231f2875df5c4f1fab1ef1c06acb8c2b22c256c1ee4c07938b762de33328bea5d9ffff02eb113f3510d4929ffc01deb164daaa46081cc4f0602ce0452456165d4c68d701f30615c6ae930d13a9492dffb6b1f8613f926cbd93f2781795360c4105ec6672da2937e406237c30c75272322802763f8567f46629e250617197c535483c26c1433bb8d4c556bfa35c742562f28315d3362e46e7bf83a2f8e154fe08ad9a6ca8334d7d83580f3f665802dff6c399a3ee2a27a30c9", 0xe7, 0xffffffffffffffff) keyctl$instantiate_iov(0x14, r0, &(0x7f0000000400)=[{&(0x7f0000000380)="f3740cc4095ac1e1cf177e5f20cf3b054d1a00eead04fe2bf16d9ab4a4f6d8d6452bda281bbfbb7127b67d7996605aad3e21cfcc7f1e7c805b7ff847d63bd573cdcd48e0d10e7329e067c35d79ed8572d760cfc7014b611e56f9b8e9c3f71183e3fea0b80d1810d0", 0x68}], 0x1, r1) inotify_init1(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000240)='\x00', 0xffffffffffffffff}, 0x30) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000006c00)='systemppp0bdevvmnet1\x00'}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000008c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000001c40)='syz0\x00', 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c80)) getpgrp(0x0) gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) socket$unix(0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003200), 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003140)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006580), &(0x7f00000065c0)=0xc) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000980)="42805da0c20f460f46dc0f2e2e41d9bfef000000262edcf6208600cdc176f9cbf3f30f1a7f062900c4a1051586a920ffff0f0f99583da358580606eaf30f53cf973121e079afe0302f450f2e628a99c4c4a1ff741c3f04d6660f3830c1befe8adfe2667e") 19:01:45 executing program 0: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:01:45 executing program 5: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_get$uid(0x0, 0x0) 19:01:45 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x3, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) 19:01:45 executing program 1: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) 19:01:46 executing program 3: lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000006c40)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) eventfd2(0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) r1 = add_key(&(0x7f0000000440)='ceph\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000004c0)="90a0001969250bf8bfad0541f68d3f029d55991b622a0841b1cb94dca1c029e1a3796ae002e04abf18f53e3688820231f2875df5c4f1fab1ef1c06acb8c2b22c256c1ee4c07938b762de33328bea5d9ffff02eb113f3510d4929ffc01deb164daaa46081cc4f0602ce0452456165d4c68d701f30615c6ae930d13a9492dffb6b1f8613f926cbd93f2781795360c4105ec6672da2937e406237c30c75272322802763f8567f46629e250617197c535483c26c1433bb8d4c556bfa35c742562f28315d3362e46e7bf83a2f8e154fe08ad9a6ca8334d7d83580f3f665802dff6c399a3ee2a27a30c9", 0xe7, 0xffffffffffffffff) keyctl$instantiate_iov(0x14, r0, &(0x7f0000000400)=[{&(0x7f0000000380)="f3740cc4095ac1e1cf177e5f20cf3b054d1a00eead04fe2bf16d9ab4a4f6d8d6452bda281bbfbb7127b67d7996605aad3e21cfcc7f1e7c805b7ff847d63bd573cdcd48e0d10e7329e067c35d79ed8572d760cfc7014b611e56f9b8e9c3f71183e3fea0b80d1810d0", 0x68}], 0x1, r1) inotify_init1(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000240)='\x00', 0xffffffffffffffff}, 0x30) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000006c00)='systemppp0bdevvmnet1\x00'}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000008c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000001c40)='syz0\x00', 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c80)) getpgrp(0x0) gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) socket$unix(0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003200), 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003140)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006580), &(0x7f00000065c0)=0xc) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000980)="42805da0c20f460f46dc0f2e2e41d9bfef000000262edcf6208600cdc176f9cbf3f30f1a7f062900c4a1051586a920ffff0f0f99583da358580606eaf30f53cf973121e079afe0302f450f2e628a99c4c4a1ff741c3f04d6660f3830c1befe8adfe2667e") 19:01:46 executing program 5: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_get$uid(0x0, 0x0) 19:01:46 executing program 2: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) getpgrp(0xffffffffffffffff) 19:01:46 executing program 0: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:01:46 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x3, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) 19:01:46 executing program 1: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) 19:01:47 executing program 5: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_get$uid(0x0, 0x0) 19:01:47 executing program 3: lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000006c40)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) eventfd2(0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) r1 = add_key(&(0x7f0000000440)='ceph\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000004c0)="90a0001969250bf8bfad0541f68d3f029d55991b622a0841b1cb94dca1c029e1a3796ae002e04abf18f53e3688820231f2875df5c4f1fab1ef1c06acb8c2b22c256c1ee4c07938b762de33328bea5d9ffff02eb113f3510d4929ffc01deb164daaa46081cc4f0602ce0452456165d4c68d701f30615c6ae930d13a9492dffb6b1f8613f926cbd93f2781795360c4105ec6672da2937e406237c30c75272322802763f8567f46629e250617197c535483c26c1433bb8d4c556bfa35c742562f28315d3362e46e7bf83a2f8e154fe08ad9a6ca8334d7d83580f3f665802dff6c399a3ee2a27a30c9", 0xe7, 0xffffffffffffffff) keyctl$instantiate_iov(0x14, r0, &(0x7f0000000400)=[{&(0x7f0000000380)="f3740cc4095ac1e1cf177e5f20cf3b054d1a00eead04fe2bf16d9ab4a4f6d8d6452bda281bbfbb7127b67d7996605aad3e21cfcc7f1e7c805b7ff847d63bd573cdcd48e0d10e7329e067c35d79ed8572d760cfc7014b611e56f9b8e9c3f71183e3fea0b80d1810d0", 0x68}], 0x1, r1) inotify_init1(0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000006c00)='systemppp0bdevvmnet1\x00'}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000008c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000001c40)='syz0\x00', 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c80)) getpgrp(0x0) gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) socket$unix(0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003200), 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003140)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006580), &(0x7f00000065c0)=0xc) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000980)="42805da0c20f460f46dc0f2e2e41d9bfef000000262edcf6208600cdc176f9cbf3f30f1a7f062900c4a1051586a920ffff0f0f99583da358580606eaf30f53cf973121e079afe0302f450f2e628a99c4c4a1ff741c3f04d6660f3830c1befe8adfe2667e") 19:01:47 executing program 5: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_get$uid(0x0, 0x0) 19:01:47 executing program 5: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_get$uid(0x0, 0x0) 19:01:47 executing program 5: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_get$uid(0x0, 0x0) 19:01:47 executing program 0: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:01:47 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x3, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") 19:01:47 executing program 1: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) 19:01:48 executing program 2: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) getpgrp(0xffffffffffffffff) 19:01:48 executing program 5: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_get$uid(0x0, 0x0) 19:01:48 executing program 3: lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000006c40)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) eventfd2(0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) r1 = add_key(&(0x7f0000000440)='ceph\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000004c0)="90a0001969250bf8bfad0541f68d3f029d55991b622a0841b1cb94dca1c029e1a3796ae002e04abf18f53e3688820231f2875df5c4f1fab1ef1c06acb8c2b22c256c1ee4c07938b762de33328bea5d9ffff02eb113f3510d4929ffc01deb164daaa46081cc4f0602ce0452456165d4c68d701f30615c6ae930d13a9492dffb6b1f8613f926cbd93f2781795360c4105ec6672da2937e406237c30c75272322802763f8567f46629e250617197c535483c26c1433bb8d4c556bfa35c742562f28315d3362e46e7bf83a2f8e154fe08ad9a6ca8334d7d83580f3f665802dff6c399a3ee2a27a30c9", 0xe7, 0xffffffffffffffff) keyctl$instantiate_iov(0x14, r0, &(0x7f0000000400)=[{&(0x7f0000000380)="f3740cc4095ac1e1cf177e5f20cf3b054d1a00eead04fe2bf16d9ab4a4f6d8d6452bda281bbfbb7127b67d7996605aad3e21cfcc7f1e7c805b7ff847d63bd573cdcd48e0d10e7329e067c35d79ed8572d760cfc7014b611e56f9b8e9c3f71183e3fea0b80d1810d0", 0x68}], 0x1, r1) inotify_init1(0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000006c00)='systemppp0bdevvmnet1\x00'}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000008c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000001c40)='syz0\x00', 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c80)) getpgrp(0x0) gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) socket$unix(0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003200), 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003140)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006580), &(0x7f00000065c0)=0xc) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000980)="42805da0c20f460f46dc0f2e2e41d9bfef000000262edcf6208600cdc176f9cbf3f30f1a7f062900c4a1051586a920ffff0f0f99583da358580606eaf30f53cf973121e079afe0302f450f2e628a99c4c4a1ff741c3f04d6660f3830c1befe8adfe2667e") 19:01:48 executing program 0: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:01:48 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x3, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") 19:01:48 executing program 1: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) 19:01:49 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x3, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") 19:01:49 executing program 0: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:01:49 executing program 5: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_get$uid(0x0, 0x0) 19:01:49 executing program 1: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) 19:01:49 executing program 3: lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000006c40)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) eventfd2(0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) r1 = add_key(&(0x7f0000000440)='ceph\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000004c0)="90a0001969250bf8bfad0541f68d3f029d55991b622a0841b1cb94dca1c029e1a3796ae002e04abf18f53e3688820231f2875df5c4f1fab1ef1c06acb8c2b22c256c1ee4c07938b762de33328bea5d9ffff02eb113f3510d4929ffc01deb164daaa46081cc4f0602ce0452456165d4c68d701f30615c6ae930d13a9492dffb6b1f8613f926cbd93f2781795360c4105ec6672da2937e406237c30c75272322802763f8567f46629e250617197c535483c26c1433bb8d4c556bfa35c742562f28315d3362e46e7bf83a2f8e154fe08ad9a6ca8334d7d83580f3f665802dff6c399a3ee2a27a30c9", 0xe7, 0xffffffffffffffff) keyctl$instantiate_iov(0x14, r0, &(0x7f0000000400)=[{&(0x7f0000000380)="f3740cc4095ac1e1cf177e5f20cf3b054d1a00eead04fe2bf16d9ab4a4f6d8d6452bda281bbfbb7127b67d7996605aad3e21cfcc7f1e7c805b7ff847d63bd573cdcd48e0d10e7329e067c35d79ed8572d760cfc7014b611e56f9b8e9c3f71183e3fea0b80d1810d0", 0x68}], 0x1, r1) inotify_init1(0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000006c00)='systemppp0bdevvmnet1\x00'}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000008c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000001c40)='syz0\x00', 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c80)) getpgrp(0x0) gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) socket$unix(0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003200), 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003140)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006580), &(0x7f00000065c0)=0xc) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000980)="42805da0c20f460f46dc0f2e2e41d9bfef000000262edcf6208600cdc176f9cbf3f30f1a7f062900c4a1051586a920ffff0f0f99583da358580606eaf30f53cf973121e079afe0302f450f2e628a99c4c4a1ff741c3f04d6660f3830c1befe8adfe2667e") 19:01:49 executing program 3: lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000006c40)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) eventfd2(0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) r1 = add_key(&(0x7f0000000440)='ceph\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000004c0)="90a0001969250bf8bfad0541f68d3f029d55991b622a0841b1cb94dca1c029e1a3796ae002e04abf18f53e3688820231f2875df5c4f1fab1ef1c06acb8c2b22c256c1ee4c07938b762de33328bea5d9ffff02eb113f3510d4929ffc01deb164daaa46081cc4f0602ce0452456165d4c68d701f30615c6ae930d13a9492dffb6b1f8613f926cbd93f2781795360c4105ec6672da2937e406237c30c75272322802763f8567f46629e250617197c535483c26c1433bb8d4c556bfa35c742562f28315d3362e46e7bf83a2f8e154fe08ad9a6ca8334d7d83580f3f665802dff6c399a3ee2a27a30c9", 0xe7, 0xffffffffffffffff) keyctl$instantiate_iov(0x14, r0, &(0x7f0000000400)=[{&(0x7f0000000380)="f3740cc4095ac1e1cf177e5f20cf3b054d1a00eead04fe2bf16d9ab4a4f6d8d6452bda281bbfbb7127b67d7996605aad3e21cfcc7f1e7c805b7ff847d63bd573cdcd48e0d10e7329e067c35d79ed8572d760cfc7014b611e56f9b8e9c3f71183e3fea0b80d1810d0", 0x68}], 0x1, r1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000240)='\x00', 0xffffffffffffffff}, 0x30) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000006c00)='systemppp0bdevvmnet1\x00'}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000008c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000001c40)='syz0\x00', 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c80)) getpgrp(0x0) gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) socket$unix(0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003200), 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003140)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006580), &(0x7f00000065c0)=0xc) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000980)="42805da0c20f460f46dc0f2e2e41d9bfef000000262edcf6208600cdc176f9cbf3f30f1a7f062900c4a1051586a920ffff0f0f99583da358580606eaf30f53cf973121e079afe0302f450f2e628a99c4c4a1ff741c3f04d6660f3830c1befe8adfe2667e") 19:01:50 executing program 2: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) getpgrp(0xffffffffffffffff) 19:01:50 executing program 0: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:01:50 executing program 5: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_get$uid(0x0, 0x0) 19:01:50 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x3, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") 19:01:50 executing program 1: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) 19:01:50 executing program 3: lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000006c40)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) eventfd2(0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) r1 = add_key(&(0x7f0000000440)='ceph\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000004c0)="90a0001969250bf8bfad0541f68d3f029d55991b622a0841b1cb94dca1c029e1a3796ae002e04abf18f53e3688820231f2875df5c4f1fab1ef1c06acb8c2b22c256c1ee4c07938b762de33328bea5d9ffff02eb113f3510d4929ffc01deb164daaa46081cc4f0602ce0452456165d4c68d701f30615c6ae930d13a9492dffb6b1f8613f926cbd93f2781795360c4105ec6672da2937e406237c30c75272322802763f8567f46629e250617197c535483c26c1433bb8d4c556bfa35c742562f28315d3362e46e7bf83a2f8e154fe08ad9a6ca8334d7d83580f3f665802dff6c399a3ee2a27a30c9", 0xe7, 0xffffffffffffffff) keyctl$instantiate_iov(0x14, r0, &(0x7f0000000400)=[{&(0x7f0000000380)="f3740cc4095ac1e1cf177e5f20cf3b054d1a00eead04fe2bf16d9ab4a4f6d8d6452bda281bbfbb7127b67d7996605aad3e21cfcc7f1e7c805b7ff847d63bd573cdcd48e0d10e7329e067c35d79ed8572d760cfc7014b611e56f9b8e9c3f71183e3fea0b80d1810d0", 0x68}], 0x1, r1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000240)='\x00', 0xffffffffffffffff}, 0x30) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000006c00)='systemppp0bdevvmnet1\x00'}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000008c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000001c40)='syz0\x00', 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c80)) getpgrp(0x0) gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) socket$unix(0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003200), 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003140)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006580), &(0x7f00000065c0)=0xc) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000980)="42805da0c20f460f46dc0f2e2e41d9bfef000000262edcf6208600cdc176f9cbf3f30f1a7f062900c4a1051586a920ffff0f0f99583da358580606eaf30f53cf973121e079afe0302f450f2e628a99c4c4a1ff741c3f04d6660f3830c1befe8adfe2667e") 19:01:51 executing program 5: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_get$uid(0x0, 0x0) 19:01:51 executing program 0: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:01:51 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x3, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") 19:01:51 executing program 1: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) 19:01:51 executing program 3: lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000006c40)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) eventfd2(0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) r1 = add_key(&(0x7f0000000440)='ceph\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000004c0)="90a0001969250bf8bfad0541f68d3f029d55991b622a0841b1cb94dca1c029e1a3796ae002e04abf18f53e3688820231f2875df5c4f1fab1ef1c06acb8c2b22c256c1ee4c07938b762de33328bea5d9ffff02eb113f3510d4929ffc01deb164daaa46081cc4f0602ce0452456165d4c68d701f30615c6ae930d13a9492dffb6b1f8613f926cbd93f2781795360c4105ec6672da2937e406237c30c75272322802763f8567f46629e250617197c535483c26c1433bb8d4c556bfa35c742562f28315d3362e46e7bf83a2f8e154fe08ad9a6ca8334d7d83580f3f665802dff6c399a3ee2a27a30c9", 0xe7, 0xffffffffffffffff) keyctl$instantiate_iov(0x14, r0, &(0x7f0000000400)=[{&(0x7f0000000380)="f3740cc4095ac1e1cf177e5f20cf3b054d1a00eead04fe2bf16d9ab4a4f6d8d6452bda281bbfbb7127b67d7996605aad3e21cfcc7f1e7c805b7ff847d63bd573cdcd48e0d10e7329e067c35d79ed8572d760cfc7014b611e56f9b8e9c3f71183e3fea0b80d1810d0", 0x68}], 0x1, r1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000240)='\x00', 0xffffffffffffffff}, 0x30) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000006c00)='systemppp0bdevvmnet1\x00'}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000008c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000001c40)='syz0\x00', 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c80)) getpgrp(0x0) gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) socket$unix(0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003200), 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003140)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006580), &(0x7f00000065c0)=0xc) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000980)="42805da0c20f460f46dc0f2e2e41d9bfef000000262edcf6208600cdc176f9cbf3f30f1a7f062900c4a1051586a920ffff0f0f99583da358580606eaf30f53cf973121e079afe0302f450f2e628a99c4c4a1ff741c3f04d6660f3830c1befe8adfe2667e") 19:01:51 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x3, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") 19:01:52 executing program 2: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) getpgrp(0xffffffffffffffff) 19:01:52 executing program 0: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:01:52 executing program 3: lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000006c40)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) eventfd2(0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) add_key(&(0x7f0000000440)='ceph\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000004c0)="90a0001969250bf8bfad0541f68d3f029d55991b622a0841b1cb94dca1c029e1a3796ae002e04abf18f53e3688820231f2875df5c4f1fab1ef1c06acb8c2b22c256c1ee4c07938b762de33328bea5d9ffff02eb113f3510d4929ffc01deb164daaa46081cc4f0602ce0452456165d4c68d701f30615c6ae930d13a9492dffb6b1f8613f926cbd93f2781795360c4105ec6672da2937e406237c30c75272322802763f8567f46629e250617197c535483c26c1433bb8d4c556bfa35c742562f28315d3362e46e7bf83a2f8e154fe08ad9a6ca8334d7d83580f3f665802dff6c399a3ee2a27a30c9", 0xe7, 0xffffffffffffffff) inotify_init1(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000240)='\x00', 0xffffffffffffffff}, 0x30) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000006c00)='systemppp0bdevvmnet1\x00'}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000008c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000001c40)='syz0\x00', 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c80)) getpgrp(0x0) gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) socket$unix(0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003200), 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003140)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006580), &(0x7f00000065c0)=0xc) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000980)="42805da0c20f460f46dc0f2e2e41d9bfef000000262edcf6208600cdc176f9cbf3f30f1a7f062900c4a1051586a920ffff0f0f99583da358580606eaf30f53cf973121e079afe0302f450f2e628a99c4c4a1ff741c3f04d6660f3830c1befe8adfe2667e") 19:01:52 executing program 5: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_get$uid(0x0, 0x0) 19:01:52 executing program 1: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) 19:01:52 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x3, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") 19:01:52 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x3, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") 19:01:52 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x3, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") 19:01:52 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x3, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") 19:01:53 executing program 0: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:01:53 executing program 5: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_get$uid(0x0, 0x0) 19:01:53 executing program 1: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) 19:01:53 executing program 2: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) getpgrp(0xffffffffffffffff) 19:01:53 executing program 1: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) 19:01:53 executing program 3: lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000006c40)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) eventfd2(0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) add_key(&(0x7f0000000440)='ceph\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000004c0)="90a0001969250bf8bfad0541f68d3f029d55991b622a0841b1cb94dca1c029e1a3796ae002e04abf18f53e3688820231f2875df5c4f1fab1ef1c06acb8c2b22c256c1ee4c07938b762de33328bea5d9ffff02eb113f3510d4929ffc01deb164daaa46081cc4f0602ce0452456165d4c68d701f30615c6ae930d13a9492dffb6b1f8613f926cbd93f2781795360c4105ec6672da2937e406237c30c75272322802763f8567f46629e250617197c535483c26c1433bb8d4c556bfa35c742562f28315d3362e46e7bf83a2f8e154fe08ad9a6ca8334d7d83580f3f665802dff6c399a3ee2a27a30c9", 0xe7, 0xffffffffffffffff) inotify_init1(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000240)='\x00', 0xffffffffffffffff}, 0x30) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000006c00)='systemppp0bdevvmnet1\x00'}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000008c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000001c40)='syz0\x00', 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c80)) getpgrp(0x0) gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) socket$unix(0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003200), 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003140)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006580), &(0x7f00000065c0)=0xc) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000980)="42805da0c20f460f46dc0f2e2e41d9bfef000000262edcf6208600cdc176f9cbf3f30f1a7f062900c4a1051586a920ffff0f0f99583da358580606eaf30f53cf973121e079afe0302f450f2e628a99c4c4a1ff741c3f04d6660f3830c1befe8adfe2667e") 19:01:53 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x3, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") 19:01:53 executing program 1: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) 19:01:53 executing program 1: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) 19:01:53 executing program 1: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) 19:01:53 executing program 0: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:01:53 executing program 5: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_get$uid(0x0, 0x0) 19:01:53 executing program 1: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) 19:01:54 executing program 1: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) 19:01:54 executing program 1: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) 19:01:54 executing program 2: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) getpgrp(0xffffffffffffffff) 19:01:54 executing program 1: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) 19:01:54 executing program 3: lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000006c40)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) eventfd2(0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) add_key(&(0x7f0000000440)='ceph\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000004c0)="90a0001969250bf8bfad0541f68d3f029d55991b622a0841b1cb94dca1c029e1a3796ae002e04abf18f53e3688820231f2875df5c4f1fab1ef1c06acb8c2b22c256c1ee4c07938b762de33328bea5d9ffff02eb113f3510d4929ffc01deb164daaa46081cc4f0602ce0452456165d4c68d701f30615c6ae930d13a9492dffb6b1f8613f926cbd93f2781795360c4105ec6672da2937e406237c30c75272322802763f8567f46629e250617197c535483c26c1433bb8d4c556bfa35c742562f28315d3362e46e7bf83a2f8e154fe08ad9a6ca8334d7d83580f3f665802dff6c399a3ee2a27a30c9", 0xe7, 0xffffffffffffffff) inotify_init1(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000240)='\x00', 0xffffffffffffffff}, 0x30) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000006c00)='systemppp0bdevvmnet1\x00'}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000008c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000001c40)='syz0\x00', 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c80)) getpgrp(0x0) gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) socket$unix(0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003200), 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003140)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006580), &(0x7f00000065c0)=0xc) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000980)="42805da0c20f460f46dc0f2e2e41d9bfef000000262edcf6208600cdc176f9cbf3f30f1a7f062900c4a1051586a920ffff0f0f99583da358580606eaf30f53cf973121e079afe0302f450f2e628a99c4c4a1ff741c3f04d6660f3830c1befe8adfe2667e") 19:01:54 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x3, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") 19:01:54 executing program 0: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:01:54 executing program 5: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_get$uid(0x0, 0x0) 19:01:54 executing program 1: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) 19:01:55 executing program 0: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:01:55 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x3, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") 19:01:55 executing program 0: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:01:55 executing program 5: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_get$uid(0x0, 0x0) 19:01:55 executing program 0: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:01:56 executing program 2: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) getpgrp(0xffffffffffffffff) 19:01:56 executing program 0: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:01:56 executing program 1: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) 19:01:56 executing program 3: lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000006c40)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) eventfd2(0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) keyctl$instantiate_iov(0x14, r0, &(0x7f0000000400)=[{&(0x7f0000000380)="f3740cc4095ac1e1cf177e5f20cf3b054d1a00eead04fe2bf16d9ab4a4f6d8d6452bda281bbfbb7127b67d7996605aad3e21cfcc7f1e7c805b7ff847d63bd573cdcd48e0d10e7329e067c35d79ed8572d760cfc7014b611e56f9b8e9c3f71183e3fea0b80d1810d0", 0x68}], 0x1, 0x0) inotify_init1(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000240)='\x00', 0xffffffffffffffff}, 0x30) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000006c00)='systemppp0bdevvmnet1\x00'}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000008c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000001c40)='syz0\x00', 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c80)) getpgrp(0x0) gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) socket$unix(0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003200), 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003140)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006580), &(0x7f00000065c0)=0xc) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000980)="42805da0c20f460f46dc0f2e2e41d9bfef000000262edcf6208600cdc176f9cbf3f30f1a7f062900c4a1051586a920ffff0f0f99583da358580606eaf30f53cf973121e079afe0302f450f2e628a99c4c4a1ff741c3f04d6660f3830c1befe8adfe2667e") 19:01:56 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x3, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") 19:01:56 executing program 5: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_get$uid(0x0, 0x0) 19:01:56 executing program 0: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:01:56 executing program 1: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) 19:01:57 executing program 3: lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000006c40)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) eventfd2(0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) keyctl$instantiate_iov(0x14, r0, &(0x7f0000000400)=[{&(0x7f0000000380)="f3740cc4095ac1e1cf177e5f20cf3b054d1a00eead04fe2bf16d9ab4a4f6d8d6452bda281bbfbb7127b67d7996605aad3e21cfcc7f1e7c805b7ff847d63bd573cdcd48e0d10e7329e067c35d79ed8572d760cfc7014b611e56f9b8e9c3f71183e3fea0b80d1810d0", 0x68}], 0x1, 0x0) inotify_init1(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000240)='\x00', 0xffffffffffffffff}, 0x30) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000006c00)='systemppp0bdevvmnet1\x00'}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000008c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000001c40)='syz0\x00', 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c80)) getpgrp(0x0) gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) socket$unix(0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003200), 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003140)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006580), &(0x7f00000065c0)=0xc) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000980)="42805da0c20f460f46dc0f2e2e41d9bfef000000262edcf6208600cdc176f9cbf3f30f1a7f062900c4a1051586a920ffff0f0f99583da358580606eaf30f53cf973121e079afe0302f450f2e628a99c4c4a1ff741c3f04d6660f3830c1befe8adfe2667e") 19:01:57 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x3, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") 19:01:57 executing program 5: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_get$uid(0x0, 0x0) 19:01:57 executing program 0: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:01:58 executing program 2: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) getpgrp(0xffffffffffffffff) 19:01:58 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:01:58 executing program 3: lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000006c40)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) eventfd2(0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) keyctl$instantiate_iov(0x14, r0, &(0x7f0000000400)=[{&(0x7f0000000380)="f3740cc4095ac1e1cf177e5f20cf3b054d1a00eead04fe2bf16d9ab4a4f6d8d6452bda281bbfbb7127b67d7996605aad3e21cfcc7f1e7c805b7ff847d63bd573cdcd48e0d10e7329e067c35d79ed8572d760cfc7014b611e56f9b8e9c3f71183e3fea0b80d1810d0", 0x68}], 0x1, 0x0) inotify_init1(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000240)='\x00', 0xffffffffffffffff}, 0x30) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000006c00)='systemppp0bdevvmnet1\x00'}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000008c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000001c40)='syz0\x00', 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c80)) getpgrp(0x0) gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) socket$unix(0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003200), 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003140)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006580), &(0x7f00000065c0)=0xc) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000980)="42805da0c20f460f46dc0f2e2e41d9bfef000000262edcf6208600cdc176f9cbf3f30f1a7f062900c4a1051586a920ffff0f0f99583da358580606eaf30f53cf973121e079afe0302f450f2e628a99c4c4a1ff741c3f04d6660f3830c1befe8adfe2667e") 19:01:58 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x3, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") 19:01:58 executing program 5: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_get$uid(0x0, 0x0) 19:01:58 executing program 0: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:01:58 executing program 5: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_get$uid(0x0, 0x0) 19:01:58 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x3, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") 19:01:58 executing program 1: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) inotify_init() fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fc40295034fa9450f2e1ac4a10d72d2cce2984d7f") clock_gettime(0x0, &(0x7f0000000700)) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f00000006c0), &(0x7f0000000740), 0xfffffc88) geteuid() quotactl(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000004c0)) times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) getgid() lchown(&(0x7f0000001cc0)='./file1\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9430feefae5bbb80923b809235dc46299bb091a012b64ac9b5d31a3b786e2989f7f") getitimer(0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000340)='+lo\']\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/118, 0x76, 0x0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="d77acdfc5a79"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000680)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000940)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d40)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002700)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000026c0)='+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003940)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f0000003a40)=0xe8) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003ac0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004080)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffe1e, &(0x7f0000003d00)='*#(-nodev@\x00'}, 0x30) 19:01:59 executing program 3: lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000006c40)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) eventfd2(0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) r0 = add_key(&(0x7f0000000440)='ceph\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000004c0)="90a0001969250bf8bfad0541f68d3f029d55991b622a0841b1cb94dca1c029e1a3796ae002e04abf18f53e3688820231f2875df5c4f1fab1ef1c06acb8c2b22c256c1ee4c07938b762de33328bea5d9ffff02eb113f3510d4929ffc01deb164daaa46081cc4f0602ce0452456165d4c68d701f30615c6ae930d13a9492dffb6b1f8613f926cbd93f2781795360c4105ec6672da2937e406237c30c75272322802763f8567f46629e250617197c535483c26c1433bb8d4c556bfa35c742562f28315d3362e46e7bf83a2f8e154fe08ad9a6ca8334d7d83580f3f665802dff6c399a3ee2a27a30c9", 0xe7, 0xffffffffffffffff) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000400)=[{&(0x7f0000000380)="f3740cc4095ac1e1cf177e5f20cf3b054d1a00eead04fe2bf16d9ab4a4f6d8d6452bda281bbfbb7127b67d7996605aad3e21cfcc7f1e7c805b7ff847d63bd573cdcd48e0d10e7329e067c35d79ed8572d760cfc7014b611e56f9b8e9c3f71183e3fea0b80d1810d0", 0x68}], 0x1, r0) inotify_init1(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000240)='\x00', 0xffffffffffffffff}, 0x30) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000006c00)='systemppp0bdevvmnet1\x00'}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000008c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000001c40)='syz0\x00', 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c80)) getpgrp(0x0) gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) socket$unix(0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003200), 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003140)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006580), &(0x7f00000065c0)=0xc) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000980)="42805da0c20f460f46dc0f2e2e41d9bfef000000262edcf6208600cdc176f9cbf3f30f1a7f062900c4a1051586a920ffff0f0f99583da358580606eaf30f53cf973121e079afe0302f450f2e628a99c4c4a1ff741c3f04d6660f3830c1befe8adfe2667e") 19:01:59 executing program 0: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:01:59 executing program 5: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_get$uid(0x0, 0x0) 19:02:00 executing program 2: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) getpgrp(0xffffffffffffffff) 19:02:00 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x3, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") 19:02:00 executing program 1: getegid() getegid() getresgid(&(0x7f0000000040), &(0x7f0000000180), &(0x7f00000001c0)) getegid() getgid() stat(&(0x7f0000000240)='./file1\x00', &(0x7f0000000300)) fstat(0xffffffffffffff9c, &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f0000000400)) stat(&(0x7f0000000480)='./file1\x00', &(0x7f00000004c0)) syz_open_procfs(0x0, &(0x7f0000000740)='maps\x00') mknodat(0xffffffffffffffff, &(0x7f0000000780)='./file0\x00', 0x0, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000800)) stat(&(0x7f0000000540)='./file1\x00', &(0x7f0000000580)) getgroups(0x0, &(0x7f0000000600)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:00 executing program 3: lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000006c40)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) eventfd2(0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) r0 = add_key(&(0x7f0000000440)='ceph\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000004c0)="90a0001969250bf8bfad0541f68d3f029d55991b622a0841b1cb94dca1c029e1a3796ae002e04abf18f53e3688820231f2875df5c4f1fab1ef1c06acb8c2b22c256c1ee4c07938b762de33328bea5d9ffff02eb113f3510d4929ffc01deb164daaa46081cc4f0602ce0452456165d4c68d701f30615c6ae930d13a9492dffb6b1f8613f926cbd93f2781795360c4105ec6672da2937e406237c30c75272322802763f8567f46629e250617197c535483c26c1433bb8d4c556bfa35c742562f28315d3362e46e7bf83a2f8e154fe08ad9a6ca8334d7d83580f3f665802dff6c399a3ee2a27a30c9", 0xe7, 0xffffffffffffffff) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000400)=[{&(0x7f0000000380)="f3740cc4095ac1e1cf177e5f20cf3b054d1a00eead04fe2bf16d9ab4a4f6d8d6452bda281bbfbb7127b67d7996605aad3e21cfcc7f1e7c805b7ff847d63bd573cdcd48e0d10e7329e067c35d79ed8572d760cfc7014b611e56f9b8e9c3f71183e3fea0b80d1810d0", 0x68}], 0x1, r0) inotify_init1(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000240)='\x00', 0xffffffffffffffff}, 0x30) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000006c00)='systemppp0bdevvmnet1\x00'}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000008c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000001c40)='syz0\x00', 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c80)) getpgrp(0x0) gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) socket$unix(0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003200), 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003140)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006580), &(0x7f00000065c0)=0xc) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000980)="42805da0c20f460f46dc0f2e2e41d9bfef000000262edcf6208600cdc176f9cbf3f30f1a7f062900c4a1051586a920ffff0f0f99583da358580606eaf30f53cf973121e079afe0302f450f2e628a99c4c4a1ff741c3f04d6660f3830c1befe8adfe2667e") 19:02:00 executing program 0: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:00 executing program 5: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_get$uid(0x0, 0x0) 19:02:00 executing program 3: lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000006c40)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) eventfd2(0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) r0 = add_key(&(0x7f0000000440)='ceph\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000004c0)="90a0001969250bf8bfad0541f68d3f029d55991b622a0841b1cb94dca1c029e1a3796ae002e04abf18f53e3688820231f2875df5c4f1fab1ef1c06acb8c2b22c256c1ee4c07938b762de33328bea5d9ffff02eb113f3510d4929ffc01deb164daaa46081cc4f0602ce0452456165d4c68d701f30615c6ae930d13a9492dffb6b1f8613f926cbd93f2781795360c4105ec6672da2937e406237c30c75272322802763f8567f46629e250617197c535483c26c1433bb8d4c556bfa35c742562f28315d3362e46e7bf83a2f8e154fe08ad9a6ca8334d7d83580f3f665802dff6c399a3ee2a27a30c9", 0xe7, 0xffffffffffffffff) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000400)=[{&(0x7f0000000380)="f3740cc4095ac1e1cf177e5f20cf3b054d1a00eead04fe2bf16d9ab4a4f6d8d6452bda281bbfbb7127b67d7996605aad3e21cfcc7f1e7c805b7ff847d63bd573cdcd48e0d10e7329e067c35d79ed8572d760cfc7014b611e56f9b8e9c3f71183e3fea0b80d1810d0", 0x68}], 0x1, r0) inotify_init1(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000240)='\x00', 0xffffffffffffffff}, 0x30) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000006c00)='systemppp0bdevvmnet1\x00'}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000008c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000001c40)='syz0\x00', 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c80)) getpgrp(0x0) gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) socket$unix(0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003200), 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003140)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006580), &(0x7f00000065c0)=0xc) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000980)="42805da0c20f460f46dc0f2e2e41d9bfef000000262edcf6208600cdc176f9cbf3f30f1a7f062900c4a1051586a920ffff0f0f99583da358580606eaf30f53cf973121e079afe0302f450f2e628a99c4c4a1ff741c3f04d6660f3830c1befe8adfe2667e") 19:02:00 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x3, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") 19:02:01 executing program 1: fstat(0xffffffffffffff9c, &(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:01 executing program 0: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:01 executing program 5: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_get$uid(0x0, 0x0) 19:02:01 executing program 5: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_get$uid(0x0, 0x0) 19:02:01 executing program 2: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) getpgrp(0xffffffffffffffff) 19:02:01 executing program 3: lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000006c40)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) eventfd2(0x0, 0x0) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) r1 = add_key(&(0x7f0000000440)='ceph\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000004c0)="90a0001969250bf8bfad0541f68d3f029d55991b622a0841b1cb94dca1c029e1a3796ae002e04abf18f53e3688820231f2875df5c4f1fab1ef1c06acb8c2b22c256c1ee4c07938b762de33328bea5d9ffff02eb113f3510d4929ffc01deb164daaa46081cc4f0602ce0452456165d4c68d701f30615c6ae930d13a9492dffb6b1f8613f926cbd93f2781795360c4105ec6672da2937e406237c30c75272322802763f8567f46629e250617197c535483c26c1433bb8d4c556bfa35c742562f28315d3362e46e7bf83a2f8e154fe08ad9a6ca8334d7d83580f3f665802dff6c399a3ee2a27a30c9", 0xe7, 0xffffffffffffffff) keyctl$instantiate_iov(0x14, r0, &(0x7f0000000400)=[{&(0x7f0000000380)="f3740cc4095ac1e1cf177e5f20cf3b054d1a00eead04fe2bf16d9ab4a4f6d8d6452bda281bbfbb7127b67d7996605aad3e21cfcc7f1e7c805b7ff847d63bd573cdcd48e0d10e7329e067c35d79ed8572d760cfc7014b611e56f9b8e9c3f71183e3fea0b80d1810d0", 0x68}], 0x1, r1) inotify_init1(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000240)='\x00', 0xffffffffffffffff}, 0x30) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000006c00)='systemppp0bdevvmnet1\x00'}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000008c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000001c40)='syz0\x00', 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c80)) getpgrp(0x0) gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) socket$unix(0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003200), 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003140)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006580), &(0x7f00000065c0)=0xc) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000980)="42805da0c20f460f46dc0f2e2e41d9bfef000000262edcf6208600cdc176f9cbf3f30f1a7f062900c4a1051586a920ffff0f0f99583da358580606eaf30f53cf973121e079afe0302f450f2e628a99c4c4a1ff741c3f04d6660f3830c1befe8adfe2667e") 19:02:01 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x3, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") 19:02:01 executing program 0: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:01 executing program 1: getegid() getegid() getresgid(&(0x7f0000000040), &(0x7f0000000180), &(0x7f00000001c0)) getegid() getgid() stat(&(0x7f0000000240)='./file1\x00', &(0x7f0000000300)) fstat(0xffffffffffffff9c, &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f0000000400)) stat(&(0x7f0000000480)='./file1\x00', &(0x7f00000004c0)) syz_open_procfs(0x0, &(0x7f0000000740)='maps\x00') mknodat(0xffffffffffffffff, &(0x7f0000000780)='./file0\x00', 0x0, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000800)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:02 executing program 5: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_get$uid(0x0, 0x0) 19:02:02 executing program 0: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:02 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x3, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") 19:02:02 executing program 1: getegid() getegid() getresgid(&(0x7f0000000040), &(0x7f0000000180), &(0x7f00000001c0)) getegid() getgid() stat(&(0x7f0000000240)='./file1\x00', &(0x7f0000000300)) fstat(0xffffffffffffff9c, &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f0000000400)) stat(&(0x7f0000000480)='./file1\x00', &(0x7f00000004c0)) syz_open_procfs(0x0, &(0x7f0000000740)='maps\x00') mknodat(0xffffffffffffffff, &(0x7f0000000780)='./file0\x00', 0x0, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000800)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:02 executing program 3: lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000006c40)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) eventfd2(0x0, 0x0) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) r1 = add_key(&(0x7f0000000440)='ceph\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000004c0)="90a0001969250bf8bfad0541f68d3f029d55991b622a0841b1cb94dca1c029e1a3796ae002e04abf18f53e3688820231f2875df5c4f1fab1ef1c06acb8c2b22c256c1ee4c07938b762de33328bea5d9ffff02eb113f3510d4929ffc01deb164daaa46081cc4f0602ce0452456165d4c68d701f30615c6ae930d13a9492dffb6b1f8613f926cbd93f2781795360c4105ec6672da2937e406237c30c75272322802763f8567f46629e250617197c535483c26c1433bb8d4c556bfa35c742562f28315d3362e46e7bf83a2f8e154fe08ad9a6ca8334d7d83580f3f665802dff6c399a3ee2a27a30c9", 0xe7, 0xffffffffffffffff) keyctl$instantiate_iov(0x14, r0, &(0x7f0000000400)=[{&(0x7f0000000380)="f3740cc4095ac1e1cf177e5f20cf3b054d1a00eead04fe2bf16d9ab4a4f6d8d6452bda281bbfbb7127b67d7996605aad3e21cfcc7f1e7c805b7ff847d63bd573cdcd48e0d10e7329e067c35d79ed8572d760cfc7014b611e56f9b8e9c3f71183e3fea0b80d1810d0", 0x68}], 0x1, r1) inotify_init1(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000240)='\x00', 0xffffffffffffffff}, 0x30) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000006c00)='systemppp0bdevvmnet1\x00'}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000008c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000001c40)='syz0\x00', 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c80)) getpgrp(0x0) gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) socket$unix(0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003200), 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003140)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006580), &(0x7f00000065c0)=0xc) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000980)="42805da0c20f460f46dc0f2e2e41d9bfef000000262edcf6208600cdc176f9cbf3f30f1a7f062900c4a1051586a920ffff0f0f99583da358580606eaf30f53cf973121e079afe0302f450f2e628a99c4c4a1ff741c3f04d6660f3830c1befe8adfe2667e") 19:02:03 executing program 5: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_get$uid(0x0, 0x0) 19:02:03 executing program 0: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:04 executing program 2: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) getpgrp(0xffffffffffffffff) 19:02:04 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x3, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") 19:02:04 executing program 3: lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000006c40)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) eventfd2(0x0, 0x0) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) r1 = add_key(&(0x7f0000000440)='ceph\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000004c0)="90a0001969250bf8bfad0541f68d3f029d55991b622a0841b1cb94dca1c029e1a3796ae002e04abf18f53e3688820231f2875df5c4f1fab1ef1c06acb8c2b22c256c1ee4c07938b762de33328bea5d9ffff02eb113f3510d4929ffc01deb164daaa46081cc4f0602ce0452456165d4c68d701f30615c6ae930d13a9492dffb6b1f8613f926cbd93f2781795360c4105ec6672da2937e406237c30c75272322802763f8567f46629e250617197c535483c26c1433bb8d4c556bfa35c742562f28315d3362e46e7bf83a2f8e154fe08ad9a6ca8334d7d83580f3f665802dff6c399a3ee2a27a30c9", 0xe7, 0xffffffffffffffff) keyctl$instantiate_iov(0x14, r0, &(0x7f0000000400)=[{&(0x7f0000000380)="f3740cc4095ac1e1cf177e5f20cf3b054d1a00eead04fe2bf16d9ab4a4f6d8d6452bda281bbfbb7127b67d7996605aad3e21cfcc7f1e7c805b7ff847d63bd573cdcd48e0d10e7329e067c35d79ed8572d760cfc7014b611e56f9b8e9c3f71183e3fea0b80d1810d0", 0x68}], 0x1, r1) inotify_init1(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000240)='\x00', 0xffffffffffffffff}, 0x30) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000006c00)='systemppp0bdevvmnet1\x00'}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000008c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000001c40)='syz0\x00', 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c80)) getpgrp(0x0) gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) socket$unix(0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003200), 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003140)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006580), &(0x7f00000065c0)=0xc) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000980)="42805da0c20f460f46dc0f2e2e41d9bfef000000262edcf6208600cdc176f9cbf3f30f1a7f062900c4a1051586a920ffff0f0f99583da358580606eaf30f53cf973121e079afe0302f450f2e628a99c4c4a1ff741c3f04d6660f3830c1befe8adfe2667e") 19:02:04 executing program 1: getegid() getegid() getresgid(&(0x7f0000000040), &(0x7f0000000180), &(0x7f00000001c0)) getegid() getgid() stat(&(0x7f0000000240)='./file1\x00', &(0x7f0000000300)) fstat(0xffffffffffffff9c, &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f0000000400)) stat(&(0x7f0000000480)='./file1\x00', &(0x7f00000004c0)) syz_open_procfs(0x0, &(0x7f0000000740)='maps\x00') mknodat(0xffffffffffffffff, &(0x7f0000000780)='./file0\x00', 0x0, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000800)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:04 executing program 5: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_get$uid(0x0, 0x0) 19:02:04 executing program 0: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:05 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x3, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") 19:02:05 executing program 5: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_get$uid(0x0, 0x0) 19:02:05 executing program 1: getegid() getegid() getresgid(&(0x7f0000000040), &(0x7f0000000180), &(0x7f00000001c0)) getegid() getgid() stat(&(0x7f0000000240)='./file1\x00', &(0x7f0000000300)) fstat(0xffffffffffffff9c, &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f0000000400)) stat(&(0x7f0000000480)='./file1\x00', &(0x7f00000004c0)) syz_open_procfs(0x0, &(0x7f0000000740)='maps\x00') mknodat(0xffffffffffffffff, &(0x7f0000000780)='./file0\x00', 0x0, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000800)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:05 executing program 3: lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000006c40)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) r1 = add_key(&(0x7f0000000440)='ceph\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000004c0)="90a0001969250bf8bfad0541f68d3f029d55991b622a0841b1cb94dca1c029e1a3796ae002e04abf18f53e3688820231f2875df5c4f1fab1ef1c06acb8c2b22c256c1ee4c07938b762de33328bea5d9ffff02eb113f3510d4929ffc01deb164daaa46081cc4f0602ce0452456165d4c68d701f30615c6ae930d13a9492dffb6b1f8613f926cbd93f2781795360c4105ec6672da2937e406237c30c75272322802763f8567f46629e250617197c535483c26c1433bb8d4c556bfa35c742562f28315d3362e46e7bf83a2f8e154fe08ad9a6ca8334d7d83580f3f665802dff6c399a3ee2a27a30c9", 0xe7, 0xffffffffffffffff) keyctl$instantiate_iov(0x14, r0, &(0x7f0000000400)=[{&(0x7f0000000380)="f3740cc4095ac1e1cf177e5f20cf3b054d1a00eead04fe2bf16d9ab4a4f6d8d6452bda281bbfbb7127b67d7996605aad3e21cfcc7f1e7c805b7ff847d63bd573cdcd48e0d10e7329e067c35d79ed8572d760cfc7014b611e56f9b8e9c3f71183e3fea0b80d1810d0", 0x68}], 0x1, r1) inotify_init1(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000240)='\x00', 0xffffffffffffffff}, 0x30) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000006c00)='systemppp0bdevvmnet1\x00'}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000008c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000001c40)='syz0\x00', 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c80)) getpgrp(0x0) gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) socket$unix(0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003200), 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003140)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006580), &(0x7f00000065c0)=0xc) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000980)="42805da0c20f460f46dc0f2e2e41d9bfef000000262edcf6208600cdc176f9cbf3f30f1a7f062900c4a1051586a920ffff0f0f99583da358580606eaf30f53cf973121e079afe0302f450f2e628a99c4c4a1ff741c3f04d6660f3830c1befe8adfe2667e") 19:02:05 executing program 0: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:05 executing program 5: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_get$uid(0x0, 0x0) 19:02:06 executing program 2: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) getpgrp(0xffffffffffffffff) 19:02:06 executing program 1: getegid() getegid() getresgid(&(0x7f0000000040), &(0x7f0000000180), &(0x7f00000001c0)) getegid() getgid() stat(&(0x7f0000000240)='./file1\x00', &(0x7f0000000300)) fstat(0xffffffffffffff9c, &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f0000000400)) stat(&(0x7f0000000480)='./file1\x00', &(0x7f00000004c0)) syz_open_procfs(0x0, &(0x7f0000000740)='maps\x00') mknodat(0xffffffffffffffff, &(0x7f0000000780)='./file0\x00', 0x0, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000800)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 19:02:06 executing program 3: lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000006c40)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) r1 = add_key(&(0x7f0000000440)='ceph\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000004c0)="90a0001969250bf8bfad0541f68d3f029d55991b622a0841b1cb94dca1c029e1a3796ae002e04abf18f53e3688820231f2875df5c4f1fab1ef1c06acb8c2b22c256c1ee4c07938b762de33328bea5d9ffff02eb113f3510d4929ffc01deb164daaa46081cc4f0602ce0452456165d4c68d701f30615c6ae930d13a9492dffb6b1f8613f926cbd93f2781795360c4105ec6672da2937e406237c30c75272322802763f8567f46629e250617197c535483c26c1433bb8d4c556bfa35c742562f28315d3362e46e7bf83a2f8e154fe08ad9a6ca8334d7d83580f3f665802dff6c399a3ee2a27a30c9", 0xe7, 0xffffffffffffffff) keyctl$instantiate_iov(0x14, r0, &(0x7f0000000400)=[{&(0x7f0000000380)="f3740cc4095ac1e1cf177e5f20cf3b054d1a00eead04fe2bf16d9ab4a4f6d8d6452bda281bbfbb7127b67d7996605aad3e21cfcc7f1e7c805b7ff847d63bd573cdcd48e0d10e7329e067c35d79ed8572d760cfc7014b611e56f9b8e9c3f71183e3fea0b80d1810d0", 0x68}], 0x1, r1) inotify_init1(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000240)='\x00', 0xffffffffffffffff}, 0x30) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000006c00)='systemppp0bdevvmnet1\x00'}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000008c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000001c40)='syz0\x00', 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c80)) getpgrp(0x0) gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) socket$unix(0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003200), 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003140)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006580), &(0x7f00000065c0)=0xc) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000980)="42805da0c20f460f46dc0f2e2e41d9bfef000000262edcf6208600cdc176f9cbf3f30f1a7f062900c4a1051586a920ffff0f0f99583da358580606eaf30f53cf973121e079afe0302f450f2e628a99c4c4a1ff741c3f04d6660f3830c1befe8adfe2667e") 19:02:06 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x3, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") 19:02:06 executing program 0: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:06 executing program 1: getegid() getegid() getresgid(&(0x7f0000000040), &(0x7f0000000180), &(0x7f00000001c0)) getegid() getgid() stat(&(0x7f0000000240)='./file1\x00', &(0x7f0000000300)) fstat(0xffffffffffffff9c, &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f0000000400)) stat(&(0x7f0000000480)='./file1\x00', &(0x7f00000004c0)) syz_open_procfs(0x0, &(0x7f0000000740)='maps\x00') mknodat(0xffffffffffffffff, &(0x7f0000000780)='./file0\x00', 0x0, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000800)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 19:02:06 executing program 1: getegid() getegid() getresgid(&(0x7f0000000040), &(0x7f0000000180), &(0x7f00000001c0)) getegid() getgid() stat(&(0x7f0000000240)='./file1\x00', &(0x7f0000000300)) fstat(0xffffffffffffff9c, &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f0000000400)) stat(&(0x7f0000000480)='./file1\x00', &(0x7f00000004c0)) syz_open_procfs(0x0, &(0x7f0000000740)='maps\x00') mknodat(0xffffffffffffffff, &(0x7f0000000780)='./file0\x00', 0x0, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000800)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 19:02:06 executing program 1: getegid() getegid() getresgid(&(0x7f0000000040), &(0x7f0000000180), &(0x7f00000001c0)) getegid() getgid() stat(&(0x7f0000000240)='./file1\x00', &(0x7f0000000300)) fstat(0xffffffffffffff9c, &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f0000000400)) stat(&(0x7f0000000480)='./file1\x00', &(0x7f00000004c0)) syz_open_procfs(0x0, &(0x7f0000000740)='maps\x00') mknodat(0xffffffffffffffff, &(0x7f0000000780)='./file0\x00', 0x0, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000800)) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:06 executing program 5: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_get$uid(0x0, 0x0) 19:02:06 executing program 1: getegid() getegid() getresgid(&(0x7f0000000040), &(0x7f0000000180), &(0x7f00000001c0)) getegid() getgid() stat(&(0x7f0000000240)='./file1\x00', &(0x7f0000000300)) fstat(0xffffffffffffff9c, &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f0000000400)) stat(&(0x7f0000000480)='./file1\x00', &(0x7f00000004c0)) syz_open_procfs(0x0, &(0x7f0000000740)='maps\x00') mknodat(0xffffffffffffffff, &(0x7f0000000780)='./file0\x00', 0x0, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000800)) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:06 executing program 1: getegid() getegid() getresgid(&(0x7f0000000040), &(0x7f0000000180), &(0x7f00000001c0)) getegid() getgid() stat(&(0x7f0000000240)='./file1\x00', &(0x7f0000000300)) fstat(0xffffffffffffff9c, &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f0000000400)) stat(&(0x7f0000000480)='./file1\x00', &(0x7f00000004c0)) syz_open_procfs(0x0, &(0x7f0000000740)='maps\x00') mknodat(0xffffffffffffffff, &(0x7f0000000780)='./file0\x00', 0x0, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000800)) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:06 executing program 0: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:07 executing program 2: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) getpgrp(0xffffffffffffffff) 19:02:07 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x3, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") 19:02:07 executing program 1: getegid() getegid() getresgid(&(0x7f0000000040), &(0x7f0000000180), &(0x7f00000001c0)) getegid() getgid() stat(&(0x7f0000000240)='./file1\x00', &(0x7f0000000300)) fstat(0xffffffffffffff9c, &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f0000000400)) stat(&(0x7f0000000480)='./file1\x00', &(0x7f00000004c0)) syz_open_procfs(0x0, &(0x7f0000000740)='maps\x00') mknodat(0xffffffffffffffff, &(0x7f0000000780)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:07 executing program 3: lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000006c40)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) r1 = add_key(&(0x7f0000000440)='ceph\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000004c0)="90a0001969250bf8bfad0541f68d3f029d55991b622a0841b1cb94dca1c029e1a3796ae002e04abf18f53e3688820231f2875df5c4f1fab1ef1c06acb8c2b22c256c1ee4c07938b762de33328bea5d9ffff02eb113f3510d4929ffc01deb164daaa46081cc4f0602ce0452456165d4c68d701f30615c6ae930d13a9492dffb6b1f8613f926cbd93f2781795360c4105ec6672da2937e406237c30c75272322802763f8567f46629e250617197c535483c26c1433bb8d4c556bfa35c742562f28315d3362e46e7bf83a2f8e154fe08ad9a6ca8334d7d83580f3f665802dff6c399a3ee2a27a30c9", 0xe7, 0xffffffffffffffff) keyctl$instantiate_iov(0x14, r0, &(0x7f0000000400)=[{&(0x7f0000000380)="f3740cc4095ac1e1cf177e5f20cf3b054d1a00eead04fe2bf16d9ab4a4f6d8d6452bda281bbfbb7127b67d7996605aad3e21cfcc7f1e7c805b7ff847d63bd573cdcd48e0d10e7329e067c35d79ed8572d760cfc7014b611e56f9b8e9c3f71183e3fea0b80d1810d0", 0x68}], 0x1, r1) inotify_init1(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000240)='\x00', 0xffffffffffffffff}, 0x30) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000006c00)='systemppp0bdevvmnet1\x00'}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000008c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000001c40)='syz0\x00', 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c80)) getpgrp(0x0) gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) socket$unix(0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003200), 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003140)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006580), &(0x7f00000065c0)=0xc) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000980)="42805da0c20f460f46dc0f2e2e41d9bfef000000262edcf6208600cdc176f9cbf3f30f1a7f062900c4a1051586a920ffff0f0f99583da358580606eaf30f53cf973121e079afe0302f450f2e628a99c4c4a1ff741c3f04d6660f3830c1befe8adfe2667e") 19:02:07 executing program 5: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x406, r0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(0xffffffffffffffff, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r0, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_get$uid(0x0, 0x0) 19:02:07 executing program 0: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:08 executing program 5: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x406, r0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(0xffffffffffffffff, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r0, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_get$uid(0x0, 0x0) 19:02:08 executing program 0: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:08 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x3, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") 19:02:08 executing program 1: getegid() getegid() getresgid(&(0x7f0000000040), &(0x7f0000000180), &(0x7f00000001c0)) getegid() getgid() stat(&(0x7f0000000240)='./file1\x00', &(0x7f0000000300)) fstat(0xffffffffffffff9c, &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f0000000400)) stat(&(0x7f0000000480)='./file1\x00', &(0x7f00000004c0)) syz_open_procfs(0x0, &(0x7f0000000740)='maps\x00') mknodat(0xffffffffffffffff, &(0x7f0000000780)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:08 executing program 3: lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000006c40)) eventfd2(0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) r1 = add_key(&(0x7f0000000440)='ceph\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000004c0)="90a0001969250bf8bfad0541f68d3f029d55991b622a0841b1cb94dca1c029e1a3796ae002e04abf18f53e3688820231f2875df5c4f1fab1ef1c06acb8c2b22c256c1ee4c07938b762de33328bea5d9ffff02eb113f3510d4929ffc01deb164daaa46081cc4f0602ce0452456165d4c68d701f30615c6ae930d13a9492dffb6b1f8613f926cbd93f2781795360c4105ec6672da2937e406237c30c75272322802763f8567f46629e250617197c535483c26c1433bb8d4c556bfa35c742562f28315d3362e46e7bf83a2f8e154fe08ad9a6ca8334d7d83580f3f665802dff6c399a3ee2a27a30c9", 0xe7, 0xffffffffffffffff) keyctl$instantiate_iov(0x14, r0, &(0x7f0000000400)=[{&(0x7f0000000380)="f3740cc4095ac1e1cf177e5f20cf3b054d1a00eead04fe2bf16d9ab4a4f6d8d6452bda281bbfbb7127b67d7996605aad3e21cfcc7f1e7c805b7ff847d63bd573cdcd48e0d10e7329e067c35d79ed8572d760cfc7014b611e56f9b8e9c3f71183e3fea0b80d1810d0", 0x68}], 0x1, r1) inotify_init1(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000240)='\x00', 0xffffffffffffffff}, 0x30) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000006c00)='systemppp0bdevvmnet1\x00'}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000008c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000001c40)='syz0\x00', 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c80)) getpgrp(0x0) gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) socket$unix(0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003200), 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003140)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006580), &(0x7f00000065c0)=0xc) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000980)="42805da0c20f460f46dc0f2e2e41d9bfef000000262edcf6208600cdc176f9cbf3f30f1a7f062900c4a1051586a920ffff0f0f99583da358580606eaf30f53cf973121e079afe0302f450f2e628a99c4c4a1ff741c3f04d6660f3830c1befe8adfe2667e") 19:02:09 executing program 3: lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000006c40)) eventfd2(0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) r1 = add_key(&(0x7f0000000440)='ceph\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000004c0)="90a0001969250bf8bfad0541f68d3f029d55991b622a0841b1cb94dca1c029e1a3796ae002e04abf18f53e3688820231f2875df5c4f1fab1ef1c06acb8c2b22c256c1ee4c07938b762de33328bea5d9ffff02eb113f3510d4929ffc01deb164daaa46081cc4f0602ce0452456165d4c68d701f30615c6ae930d13a9492dffb6b1f8613f926cbd93f2781795360c4105ec6672da2937e406237c30c75272322802763f8567f46629e250617197c535483c26c1433bb8d4c556bfa35c742562f28315d3362e46e7bf83a2f8e154fe08ad9a6ca8334d7d83580f3f665802dff6c399a3ee2a27a30c9", 0xe7, 0xffffffffffffffff) keyctl$instantiate_iov(0x14, r0, &(0x7f0000000400)=[{&(0x7f0000000380)="f3740cc4095ac1e1cf177e5f20cf3b054d1a00eead04fe2bf16d9ab4a4f6d8d6452bda281bbfbb7127b67d7996605aad3e21cfcc7f1e7c805b7ff847d63bd573cdcd48e0d10e7329e067c35d79ed8572d760cfc7014b611e56f9b8e9c3f71183e3fea0b80d1810d0", 0x68}], 0x1, r1) inotify_init1(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000240)='\x00', 0xffffffffffffffff}, 0x30) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000006c00)='systemppp0bdevvmnet1\x00'}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000008c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000001c40)='syz0\x00', 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c80)) getpgrp(0x0) gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) socket$unix(0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003200), 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003140)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006580), &(0x7f00000065c0)=0xc) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000980)="42805da0c20f460f46dc0f2e2e41d9bfef000000262edcf6208600cdc176f9cbf3f30f1a7f062900c4a1051586a920ffff0f0f99583da358580606eaf30f53cf973121e079afe0302f450f2e628a99c4c4a1ff741c3f04d6660f3830c1befe8adfe2667e") 19:02:09 executing program 2: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) getpgrp(0xffffffffffffffff) 19:02:09 executing program 5: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x406, r0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(0xffffffffffffffff, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r0, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_get$uid(0x0, 0x0) 19:02:09 executing program 0: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:09 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x3, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") 19:02:09 executing program 1: getegid() getegid() getresgid(&(0x7f0000000040), &(0x7f0000000180), &(0x7f00000001c0)) getegid() getgid() stat(&(0x7f0000000240)='./file1\x00', &(0x7f0000000300)) fstat(0xffffffffffffff9c, &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f0000000400)) stat(&(0x7f0000000480)='./file1\x00', &(0x7f00000004c0)) syz_open_procfs(0x0, &(0x7f0000000740)='maps\x00') mknodat(0xffffffffffffffff, &(0x7f0000000780)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:09 executing program 3: lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000006c40)) eventfd2(0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) r1 = add_key(&(0x7f0000000440)='ceph\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000004c0)="90a0001969250bf8bfad0541f68d3f029d55991b622a0841b1cb94dca1c029e1a3796ae002e04abf18f53e3688820231f2875df5c4f1fab1ef1c06acb8c2b22c256c1ee4c07938b762de33328bea5d9ffff02eb113f3510d4929ffc01deb164daaa46081cc4f0602ce0452456165d4c68d701f30615c6ae930d13a9492dffb6b1f8613f926cbd93f2781795360c4105ec6672da2937e406237c30c75272322802763f8567f46629e250617197c535483c26c1433bb8d4c556bfa35c742562f28315d3362e46e7bf83a2f8e154fe08ad9a6ca8334d7d83580f3f665802dff6c399a3ee2a27a30c9", 0xe7, 0xffffffffffffffff) keyctl$instantiate_iov(0x14, r0, &(0x7f0000000400)=[{&(0x7f0000000380)="f3740cc4095ac1e1cf177e5f20cf3b054d1a00eead04fe2bf16d9ab4a4f6d8d6452bda281bbfbb7127b67d7996605aad3e21cfcc7f1e7c805b7ff847d63bd573cdcd48e0d10e7329e067c35d79ed8572d760cfc7014b611e56f9b8e9c3f71183e3fea0b80d1810d0", 0x68}], 0x1, r1) inotify_init1(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000240)='\x00', 0xffffffffffffffff}, 0x30) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000006c00)='systemppp0bdevvmnet1\x00'}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000008c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000001c40)='syz0\x00', 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c80)) getpgrp(0x0) gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) socket$unix(0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003200), 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003140)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006580), &(0x7f00000065c0)=0xc) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000980)="42805da0c20f460f46dc0f2e2e41d9bfef000000262edcf6208600cdc176f9cbf3f30f1a7f062900c4a1051586a920ffff0f0f99583da358580606eaf30f53cf973121e079afe0302f450f2e628a99c4c4a1ff741c3f04d6660f3830c1befe8adfe2667e") 19:02:10 executing program 0: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:10 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x3, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") 19:02:10 executing program 5: keyctl$join(0x1, &(0x7f0000000240)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_get$uid(0x0, 0x0) 19:02:10 executing program 1: getegid() getegid() getresgid(&(0x7f0000000040), &(0x7f0000000180), &(0x7f00000001c0)) getegid() getgid() stat(&(0x7f0000000240)='./file1\x00', &(0x7f0000000300)) fstat(0xffffffffffffff9c, &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f0000000400)) stat(&(0x7f0000000480)='./file1\x00', &(0x7f00000004c0)) syz_open_procfs(0x0, &(0x7f0000000740)='maps\x00') ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000800)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:10 executing program 3: lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000006c40)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) eventfd2(0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0x0) r1 = add_key(&(0x7f0000000440)='ceph\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000004c0)="90a0001969250bf8bfad0541f68d3f029d55991b622a0841b1cb94dca1c029e1a3796ae002e04abf18f53e3688820231f2875df5c4f1fab1ef1c06acb8c2b22c256c1ee4c07938b762de33328bea5d9ffff02eb113f3510d4929ffc01deb164daaa46081cc4f0602ce0452456165d4c68d701f30615c6ae930d13a9492dffb6b1f8613f926cbd93f2781795360c4105ec6672da2937e406237c30c75272322802763f8567f46629e250617197c535483c26c1433bb8d4c556bfa35c742562f28315d3362e46e7bf83a2f8e154fe08ad9a6ca8334d7d83580f3f665802dff6c399a3ee2a27a30c9", 0xe7, 0xffffffffffffffff) keyctl$instantiate_iov(0x14, r0, &(0x7f0000000400)=[{&(0x7f0000000380)="f3740cc4095ac1e1cf177e5f20cf3b054d1a00eead04fe2bf16d9ab4a4f6d8d6452bda281bbfbb7127b67d7996605aad3e21cfcc7f1e7c805b7ff847d63bd573cdcd48e0d10e7329e067c35d79ed8572d760cfc7014b611e56f9b8e9c3f71183e3fea0b80d1810d0", 0x68}], 0x1, r1) inotify_init1(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000240)='\x00', 0xffffffffffffffff}, 0x30) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000006c00)='systemppp0bdevvmnet1\x00'}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000008c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000001c40)='syz0\x00', 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c80)) getpgrp(0x0) gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) socket$unix(0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003200), 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003140)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006580), &(0x7f00000065c0)=0xc) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000980)="42805da0c20f460f46dc0f2e2e41d9bfef000000262edcf6208600cdc176f9cbf3f30f1a7f062900c4a1051586a920ffff0f0f99583da358580606eaf30f53cf973121e079afe0302f450f2e628a99c4c4a1ff741c3f04d6660f3830c1befe8adfe2667e") 19:02:11 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x3, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") 19:02:11 executing program 2: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) getpgrp(0xffffffffffffffff) 19:02:11 executing program 5: keyctl$join(0x1, &(0x7f0000000240)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_get$uid(0x0, 0x0) 19:02:11 executing program 0: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:11 executing program 1: getegid() getegid() getresgid(&(0x7f0000000040), &(0x7f0000000180), &(0x7f00000001c0)) getegid() getgid() stat(&(0x7f0000000240)='./file1\x00', &(0x7f0000000300)) fstat(0xffffffffffffff9c, &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f0000000400)) stat(&(0x7f0000000480)='./file1\x00', &(0x7f00000004c0)) syz_open_procfs(0x0, &(0x7f0000000740)='maps\x00') ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000800)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:11 executing program 3: lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000006c40)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) eventfd2(0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0x0) r1 = add_key(&(0x7f0000000440)='ceph\x00', &(0x7f0000000480), &(0x7f00000004c0)="90a0001969250bf8bfad0541f68d3f029d55991b622a0841b1cb94dca1c029e1a3796ae002e04abf18f53e3688820231f2875df5c4f1fab1ef1c06acb8c2b22c256c1ee4c07938b762de33328bea5d9ffff02eb113f3510d4929ffc01deb164daaa46081cc4f0602ce0452456165d4c68d701f30615c6ae930d13a9492dffb6b1f8613f926cbd93f2781795360c4105ec6672da2937e406237c30c75272322802763f8567f46629e250617197c535483c26c1433bb8d4c556bfa35c742562f28315d3362e46e7bf83a2f8e154fe08ad9a6ca8334d7d83580f3f665802dff6c399a3ee2a27a30c9", 0xe7, 0xffffffffffffffff) keyctl$instantiate_iov(0x14, r0, &(0x7f0000000400)=[{&(0x7f0000000380)="f3740cc4095ac1e1cf177e5f20cf3b054d1a00eead04fe2bf16d9ab4a4f6d8d6452bda281bbfbb7127b67d7996605aad3e21cfcc7f1e7c805b7ff847d63bd573cdcd48e0d10e7329e067c35d79ed8572d760cfc7014b611e56f9b8e9c3f71183e3fea0b80d1810d0", 0x68}], 0x1, r1) inotify_init1(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000240)='\x00', 0xffffffffffffffff}, 0x30) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000006c00)='systemppp0bdevvmnet1\x00'}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000008c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000001c40)='syz0\x00', 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c80)) getpgrp(0x0) gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) socket$unix(0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003200), 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003140)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006580), &(0x7f00000065c0)=0xc) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000980)="42805da0c20f460f46dc0f2e2e41d9bfef000000262edcf6208600cdc176f9cbf3f30f1a7f062900c4a1051586a920ffff0f0f99583da358580606eaf30f53cf973121e079afe0302f450f2e628a99c4c4a1ff741c3f04d6660f3830c1befe8adfe2667e") 19:02:12 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x3, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") 19:02:12 executing program 0: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:12 executing program 5: keyctl$join(0x1, &(0x7f0000000240)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_get$uid(0x0, 0x0) 19:02:12 executing program 1: getegid() getegid() getresgid(&(0x7f0000000040), &(0x7f0000000180), &(0x7f00000001c0)) getegid() getgid() stat(&(0x7f0000000240)='./file1\x00', &(0x7f0000000300)) fstat(0xffffffffffffff9c, &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f0000000400)) stat(&(0x7f0000000480)='./file1\x00', &(0x7f00000004c0)) syz_open_procfs(0x0, &(0x7f0000000740)='maps\x00') ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000800)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:12 executing program 3: lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000006c40)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) eventfd2(0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0x0) r1 = add_key(&(0x7f0000000440)='ceph\x00', &(0x7f0000000480), &(0x7f00000004c0)="90a0001969250bf8bfad0541f68d3f029d55991b622a0841b1cb94dca1c029e1a3796ae002e04abf18f53e3688820231f2875df5c4f1fab1ef1c06acb8c2b22c256c1ee4c07938b762de33328bea5d9ffff02eb113f3510d4929ffc01deb164daaa46081cc4f0602ce0452456165d4c68d701f30615c6ae930d13a9492dffb6b1f8613f926cbd93f2781795360c4105ec6672da2937e406237c30c75272322802763f8567f46629e250617197c535483c26c1433bb8d4c556bfa35c742562f28315d3362e46e7bf83a2f8e154fe08ad9a6ca8334d7d83580f3f665802dff6c399a3ee2a27a30c9", 0xe7, 0xffffffffffffffff) keyctl$instantiate_iov(0x14, r0, &(0x7f0000000400)=[{&(0x7f0000000380)="f3740cc4095ac1e1cf177e5f20cf3b054d1a00eead04fe2bf16d9ab4a4f6d8d6452bda281bbfbb7127b67d7996605aad3e21cfcc7f1e7c805b7ff847d63bd573cdcd48e0d10e7329e067c35d79ed8572d760cfc7014b611e56f9b8e9c3f71183e3fea0b80d1810d0", 0x68}], 0x1, r1) inotify_init1(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000240)='\x00', 0xffffffffffffffff}, 0x30) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000006c00)='systemppp0bdevvmnet1\x00'}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000008c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000001c40)='syz0\x00', 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c80)) getpgrp(0x0) gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) socket$unix(0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003200), 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003140)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006580), &(0x7f00000065c0)=0xc) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000980)="42805da0c20f460f46dc0f2e2e41d9bfef000000262edcf6208600cdc176f9cbf3f30f1a7f062900c4a1051586a920ffff0f0f99583da358580606eaf30f53cf973121e079afe0302f450f2e628a99c4c4a1ff741c3f04d6660f3830c1befe8adfe2667e") 19:02:12 executing program 3: lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000006c40)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) eventfd2(0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0x0) r1 = add_key(&(0x7f0000000440)='ceph\x00', &(0x7f0000000480), &(0x7f00000004c0)="90a0001969250bf8bfad0541f68d3f029d55991b622a0841b1cb94dca1c029e1a3796ae002e04abf18f53e3688820231f2875df5c4f1fab1ef1c06acb8c2b22c256c1ee4c07938b762de33328bea5d9ffff02eb113f3510d4929ffc01deb164daaa46081cc4f0602ce0452456165d4c68d701f30615c6ae930d13a9492dffb6b1f8613f926cbd93f2781795360c4105ec6672da2937e406237c30c75272322802763f8567f46629e250617197c535483c26c1433bb8d4c556bfa35c742562f28315d3362e46e7bf83a2f8e154fe08ad9a6ca8334d7d83580f3f665802dff6c399a3ee2a27a30c9", 0xe7, 0xffffffffffffffff) keyctl$instantiate_iov(0x14, r0, &(0x7f0000000400)=[{&(0x7f0000000380)="f3740cc4095ac1e1cf177e5f20cf3b054d1a00eead04fe2bf16d9ab4a4f6d8d6452bda281bbfbb7127b67d7996605aad3e21cfcc7f1e7c805b7ff847d63bd573cdcd48e0d10e7329e067c35d79ed8572d760cfc7014b611e56f9b8e9c3f71183e3fea0b80d1810d0", 0x68}], 0x1, r1) inotify_init1(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000240)='\x00', 0xffffffffffffffff}, 0x30) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000006c00)='systemppp0bdevvmnet1\x00'}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000008c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000001c40)='syz0\x00', 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c80)) getpgrp(0x0) gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) socket$unix(0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003200), 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003140)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006580), &(0x7f00000065c0)=0xc) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000980)="42805da0c20f460f46dc0f2e2e41d9bfef000000262edcf6208600cdc176f9cbf3f30f1a7f062900c4a1051586a920ffff0f0f99583da358580606eaf30f53cf973121e079afe0302f450f2e628a99c4c4a1ff741c3f04d6660f3830c1befe8adfe2667e") 19:02:12 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x3, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") 19:02:13 executing program 2: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) getpgrp(0xffffffffffffffff) 19:02:13 executing program 0: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:13 executing program 5: keyctl$join(0x1, &(0x7f0000000240)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_get$uid(0x0, 0x0) 19:02:13 executing program 1: getegid() getegid() getresgid(&(0x7f0000000040), &(0x7f0000000180), &(0x7f00000001c0)) getegid() getgid() stat(&(0x7f0000000240)='./file1\x00', &(0x7f0000000300)) fstat(0xffffffffffffff9c, &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f0000000400)) stat(&(0x7f0000000480)='./file1\x00', &(0x7f00000004c0)) mknodat(0xffffffffffffffff, &(0x7f0000000780)='./file0\x00', 0x0, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000800)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:13 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x3, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") 19:02:13 executing program 3: lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000006c40)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) eventfd2(0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0x0) r1 = add_key(&(0x7f0000000440)='ceph\x00', &(0x7f0000000480), &(0x7f00000004c0), 0x0, 0xffffffffffffffff) keyctl$instantiate_iov(0x14, r0, &(0x7f0000000400)=[{&(0x7f0000000380)="f3740cc4095ac1e1cf177e5f20cf3b054d1a00eead04fe2bf16d9ab4a4f6d8d6452bda281bbfbb7127b67d7996605aad3e21cfcc7f1e7c805b7ff847d63bd573cdcd48e0d10e7329e067c35d79ed8572d760cfc7014b611e56f9b8e9c3f71183e3fea0b80d1810d0", 0x68}], 0x1, r1) inotify_init1(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000240)='\x00', 0xffffffffffffffff}, 0x30) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000006c00)='systemppp0bdevvmnet1\x00'}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000008c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000001c40)='syz0\x00', 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c80)) getpgrp(0x0) gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) socket$unix(0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003200), 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003140)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006580), &(0x7f00000065c0)=0xc) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000980)="42805da0c20f460f46dc0f2e2e41d9bfef000000262edcf6208600cdc176f9cbf3f30f1a7f062900c4a1051586a920ffff0f0f99583da358580606eaf30f53cf973121e079afe0302f450f2e628a99c4c4a1ff741c3f04d6660f3830c1befe8adfe2667e") 19:02:14 executing program 0: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:14 executing program 5: keyctl$join(0x1, &(0x7f0000000240)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_get$uid(0x0, 0x0) 19:02:14 executing program 1: getegid() getegid() getresgid(&(0x7f0000000040), &(0x7f0000000180), &(0x7f00000001c0)) getegid() getgid() stat(&(0x7f0000000240)='./file1\x00', &(0x7f0000000300)) fstat(0xffffffffffffff9c, &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f0000000400)) stat(&(0x7f0000000480)='./file1\x00', &(0x7f00000004c0)) mknodat(0xffffffffffffffff, &(0x7f0000000780)='./file0\x00', 0x0, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000800)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:14 executing program 5: keyctl$join(0x1, &(0x7f0000000240)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_get$uid(0x0, 0x0) 19:02:14 executing program 3: lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000006c40)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) eventfd2(0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0x0) r1 = add_key(&(0x7f0000000440)='ceph\x00', &(0x7f0000000480), &(0x7f00000004c0), 0x0, 0xffffffffffffffff) keyctl$instantiate_iov(0x14, r0, &(0x7f0000000400)=[{&(0x7f0000000380)="f3740cc4095ac1e1cf177e5f20cf3b054d1a00eead04fe2bf16d9ab4a4f6d8d6452bda281bbfbb7127b67d7996605aad3e21cfcc7f1e7c805b7ff847d63bd573cdcd48e0d10e7329e067c35d79ed8572d760cfc7014b611e56f9b8e9c3f71183e3fea0b80d1810d0", 0x68}], 0x1, r1) inotify_init1(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000240)='\x00', 0xffffffffffffffff}, 0x30) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000006c00)='systemppp0bdevvmnet1\x00'}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000008c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000001c40)='syz0\x00', 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c80)) getpgrp(0x0) gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) socket$unix(0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003200), 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003140)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006580), &(0x7f00000065c0)=0xc) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000980)="42805da0c20f460f46dc0f2e2e41d9bfef000000262edcf6208600cdc176f9cbf3f30f1a7f062900c4a1051586a920ffff0f0f99583da358580606eaf30f53cf973121e079afe0302f450f2e628a99c4c4a1ff741c3f04d6660f3830c1befe8adfe2667e") 19:02:14 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x3, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") 19:02:15 executing program 2: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) getpgrp(0xffffffffffffffff) 19:02:15 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x3, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") 19:02:15 executing program 0: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:15 executing program 1: getegid() getegid() getresgid(&(0x7f0000000040), &(0x7f0000000180), &(0x7f00000001c0)) getegid() getgid() stat(&(0x7f0000000240)='./file1\x00', &(0x7f0000000300)) fstat(0xffffffffffffff9c, &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f0000000400)) stat(&(0x7f0000000480)='./file1\x00', &(0x7f00000004c0)) mknodat(0xffffffffffffffff, &(0x7f0000000780)='./file0\x00', 0x0, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000800)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:15 executing program 5: keyctl$join(0x1, &(0x7f0000000240)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) fremovexattr(0xffffffffffffffff, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_get$uid(0x0, 0x0) 19:02:15 executing program 3: lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000006c40)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) eventfd2(0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0x0) r0 = add_key(&(0x7f0000000440)='ceph\x00', &(0x7f0000000480), &(0x7f00000004c0), 0x0, 0xffffffffffffffff) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000400)=[{&(0x7f0000000380)="f3740cc4095ac1e1cf177e5f20cf3b054d1a00eead04fe2bf16d9ab4a4f6d8d6452bda281bbfbb7127b67d7996605aad3e21cfcc7f1e7c805b7ff847d63bd573cdcd48e0d10e7329e067c35d79ed8572d760cfc7014b611e56f9b8e9c3f71183e3fea0b80d1810d0", 0x68}], 0x1, r0) inotify_init1(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000240)='\x00', 0xffffffffffffffff}, 0x30) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000006c00)='systemppp0bdevvmnet1\x00'}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000008c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000001c40)='syz0\x00', 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c80)) getpgrp(0x0) gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) socket$unix(0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003200), 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003140)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006580), &(0x7f00000065c0)=0xc) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000980)="42805da0c20f460f46dc0f2e2e41d9bfef000000262edcf6208600cdc176f9cbf3f30f1a7f062900c4a1051586a920ffff0f0f99583da358580606eaf30f53cf973121e079afe0302f450f2e628a99c4c4a1ff741c3f04d6660f3830c1befe8adfe2667e") 19:02:15 executing program 0: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:15 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x3, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") 19:02:16 executing program 3: lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000006c40)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) eventfd2(0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0x0) r0 = add_key(&(0x7f0000000440)='ceph\x00', &(0x7f0000000480), &(0x7f00000004c0), 0x0, 0xffffffffffffffff) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000400), 0x0, r0) inotify_init1(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000240)='\x00', 0xffffffffffffffff}, 0x30) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000006c00)='systemppp0bdevvmnet1\x00'}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000008c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000001c40)='syz0\x00', 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c80)) getpgrp(0x0) gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) socket$unix(0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003200), 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003140)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006580), &(0x7f00000065c0)=0xc) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000980)="42805da0c20f460f46dc0f2e2e41d9bfef000000262edcf6208600cdc176f9cbf3f30f1a7f062900c4a1051586a920ffff0f0f99583da358580606eaf30f53cf973121e079afe0302f450f2e628a99c4c4a1ff741c3f04d6660f3830c1befe8adfe2667e") 19:02:16 executing program 5: keyctl$join(0x1, &(0x7f0000000240)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) fremovexattr(0xffffffffffffffff, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_get$uid(0x0, 0x0) 19:02:16 executing program 5: keyctl$join(0x1, &(0x7f0000000240)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) fremovexattr(0xffffffffffffffff, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_get$uid(0x0, 0x0) 19:02:16 executing program 1: getegid() getegid() getresgid(&(0x7f0000000040), &(0x7f0000000180), &(0x7f00000001c0)) getegid() getgid() stat(&(0x7f0000000240)='./file1\x00', &(0x7f0000000300)) fstat(0xffffffffffffff9c, &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f0000000400)) syz_open_procfs(0x0, &(0x7f0000000740)='maps\x00') mknodat(0xffffffffffffffff, &(0x7f0000000780)='./file0\x00', 0x0, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000800)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:16 executing program 2: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) getpgrp(0xffffffffffffffff) 19:02:16 executing program 5: keyctl$join(0x1, &(0x7f0000000240)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) fremovexattr(0xffffffffffffffff, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_get$uid(0x0, 0x0) 19:02:16 executing program 0: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x406, r0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(0xffffffffffffffff, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r0, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:16 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x3, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") 19:02:16 executing program 5: keyctl$join(0x1, &(0x7f0000000240)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) fremovexattr(0xffffffffffffffff, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_get$uid(0x0, 0x0) 19:02:16 executing program 5: keyctl$join(0x1, &(0x7f0000000240)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) fremovexattr(0xffffffffffffffff, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_get$uid(0x0, 0x0) 19:02:16 executing program 5: keyctl$join(0x1, &(0x7f0000000240)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) fremovexattr(0xffffffffffffffff, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_get$uid(0x0, 0x0) 19:02:16 executing program 1: getegid() getegid() getresgid(&(0x7f0000000040), &(0x7f0000000180), &(0x7f00000001c0)) getegid() getgid() stat(&(0x7f0000000240)='./file1\x00', &(0x7f0000000300)) fstat(0xffffffffffffff9c, &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f0000000400)) syz_open_procfs(0x0, &(0x7f0000000740)='maps\x00') mknodat(0xffffffffffffffff, &(0x7f0000000780)='./file0\x00', 0x0, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000800)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:17 executing program 3: lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000006c40)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) eventfd2(0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0x0) add_key(&(0x7f0000000440)='ceph\x00', &(0x7f0000000480), &(0x7f00000004c0), 0x0, 0xffffffffffffffff) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000400), 0x0, 0x0) inotify_init1(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000240)='\x00', 0xffffffffffffffff}, 0x30) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000006c00)='systemppp0bdevvmnet1\x00'}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000008c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000001c40)='syz0\x00', 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c80)) getpgrp(0x0) gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) socket$unix(0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003200), 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003140)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006580), &(0x7f00000065c0)=0xc) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000980)="42805da0c20f460f46dc0f2e2e41d9bfef000000262edcf6208600cdc176f9cbf3f30f1a7f062900c4a1051586a920ffff0f0f99583da358580606eaf30f53cf973121e079afe0302f450f2e628a99c4c4a1ff741c3f04d6660f3830c1befe8adfe2667e") 19:02:17 executing program 5: keyctl$join(0x1, &(0x7f0000000240)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) fremovexattr(0xffffffffffffffff, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_get$uid(0x0, 0x0) 19:02:17 executing program 5: keyctl$join(0x1, &(0x7f0000000240)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) fremovexattr(0xffffffffffffffff, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_get$uid(0x0, 0x0) 19:02:17 executing program 5: keyctl$join(0x1, &(0x7f0000000240)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) fremovexattr(0xffffffffffffffff, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_get$uid(0x0, 0x0) 19:02:18 executing program 2: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) getpgrp(0xffffffffffffffff) 19:02:18 executing program 5: keyctl$join(0x1, &(0x7f0000000240)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) fremovexattr(0xffffffffffffffff, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_get$uid(0x0, 0x0) 19:02:18 executing program 0: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x406, r0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(0xffffffffffffffff, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r0, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:18 executing program 1: getegid() getegid() getresgid(&(0x7f0000000040), &(0x7f0000000180), &(0x7f00000001c0)) getegid() getgid() stat(&(0x7f0000000240)='./file1\x00', &(0x7f0000000300)) fstat(0xffffffffffffff9c, &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f0000000400)) syz_open_procfs(0x0, &(0x7f0000000740)='maps\x00') mknodat(0xffffffffffffffff, &(0x7f0000000780)='./file0\x00', 0x0, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000800)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:18 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x3, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") 19:02:18 executing program 3: lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000006c40)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) eventfd2(0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0x0) add_key(&(0x7f0000000440)='ceph\x00', &(0x7f0000000480), &(0x7f00000004c0), 0x0, 0xffffffffffffffff) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000400), 0x0, 0x0) inotify_init1(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000240)='\x00', 0xffffffffffffffff}, 0x30) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000006c00)='systemppp0bdevvmnet1\x00'}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000008c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000001c40)='syz0\x00', 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c80)) getpgrp(0x0) gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) socket$unix(0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003200), 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003140)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006580), &(0x7f00000065c0)=0xc) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000980)="42805da0c20f460f46dc0f2e2e41d9bfef000000262edcf6208600cdc176f9cbf3f30f1a7f062900c4a1051586a920ffff0f0f99583da358580606eaf30f53cf973121e079afe0302f450f2e628a99c4c4a1ff741c3f04d6660f3830c1befe8adfe2667e") 19:02:18 executing program 3: lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000006c40)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) eventfd2(0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0x0) add_key(&(0x7f0000000440)='ceph\x00', &(0x7f0000000480), &(0x7f00000004c0), 0x0, 0xffffffffffffffff) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000400), 0x0, 0x0) inotify_init1(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000240)='\x00', 0xffffffffffffffff}, 0x30) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000006c00)='systemppp0bdevvmnet1\x00'}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000008c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000001c40)='syz0\x00', 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c80)) getpgrp(0x0) gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) socket$unix(0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003200), 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003140)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006580), &(0x7f00000065c0)=0xc) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000980)="42805da0c20f460f46dc0f2e2e41d9bfef000000262edcf6208600cdc176f9cbf3f30f1a7f062900c4a1051586a920ffff0f0f99583da358580606eaf30f53cf973121e079afe0302f450f2e628a99c4c4a1ff741c3f04d6660f3830c1befe8adfe2667e") 19:02:18 executing program 3: lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000006c40)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) eventfd2(0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0x0) add_key(&(0x7f0000000440)='ceph\x00', &(0x7f0000000480), &(0x7f00000004c0), 0x0, 0xffffffffffffffff) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000400), 0x0, 0x0) inotify_init1(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000240)='\x00', 0xffffffffffffffff}, 0x30) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000006c00)='systemppp0bdevvmnet1\x00'}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000008c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000001c40)='syz0\x00', 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c80)) getpgrp(0x0) gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) socket$unix(0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003200), 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003140)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006580), &(0x7f00000065c0)=0xc) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000980)="42805da0c20f460f46dc0f2e2e41d9bfef000000262edcf6208600cdc176f9cbf3f30f1a7f062900c4a1051586a920ffff0f0f99583da358580606eaf30f53cf973121e079afe0302f450f2e628a99c4c4a1ff741c3f04d6660f3830c1befe8adfe2667e") 19:02:18 executing program 3: lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000006c40)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) eventfd2(0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0x0) add_key(&(0x7f0000000440)='ceph\x00', &(0x7f0000000480), &(0x7f00000004c0), 0x0, 0xffffffffffffffff) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000400), 0x0, 0x0) inotify_init1(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000240)='\x00', 0xffffffffffffffff}, 0x30) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000006c00)='systemppp0bdevvmnet1\x00'}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000008c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000001c40)='syz0\x00', 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c80)) getpgrp(0x0) gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) socket$unix(0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003200), 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003140)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006580), &(0x7f00000065c0)=0xc) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000980)="42805da0c20f460f46dc0f2e2e41d9bfef000000262edcf6208600cdc176f9cbf3f30f1a7f062900c4a1051586a920ffff0f0f99583da358580606eaf30f53cf973121e079afe0302f450f2e628a99c4c4a1ff741c3f04d6660f3830c1befe8adfe2667e") 19:02:18 executing program 5: keyctl$join(0x1, &(0x7f0000000240)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) fremovexattr(0xffffffffffffffff, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_get$uid(0x0, 0x0) 19:02:18 executing program 3: lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000006c40)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) eventfd2(0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0x0) add_key(&(0x7f0000000440)='ceph\x00', &(0x7f0000000480), &(0x7f00000004c0), 0x0, 0xffffffffffffffff) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000400), 0x0, 0x0) inotify_init1(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000240)='\x00', 0xffffffffffffffff}, 0x30) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000006c00)='systemppp0bdevvmnet1\x00'}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000008c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000001c40)='syz0\x00', 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c80)) getpgrp(0x0) gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) socket$unix(0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003200), 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003140)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006580), &(0x7f00000065c0)=0xc) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000980)="42805da0c20f460f46dc0f2e2e41d9bfef000000262edcf6208600cdc176f9cbf3f30f1a7f062900c4a1051586a920ffff0f0f99583da358580606eaf30f53cf973121e079afe0302f450f2e628a99c4c4a1ff741c3f04d6660f3830c1befe8adfe2667e") 19:02:18 executing program 3: lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000006c40)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) eventfd2(0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0x0) add_key(&(0x7f0000000440)='ceph\x00', &(0x7f0000000480), &(0x7f00000004c0), 0x0, 0xffffffffffffffff) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000400), 0x0, 0x0) inotify_init1(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000240)='\x00', 0xffffffffffffffff}, 0x30) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000006c00)='systemppp0bdevvmnet1\x00'}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000008c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000001c40)='syz0\x00', 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c80)) getpgrp(0x0) gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) socket$unix(0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003200), 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003140)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006580), &(0x7f00000065c0)=0xc) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000980)="42805da0c20f460f46dc0f2e2e41d9bfef000000262edcf6208600cdc176f9cbf3f30f1a7f062900c4a1051586a920ffff0f0f99583da358580606eaf30f53cf973121e079afe0302f450f2e628a99c4c4a1ff741c3f04d6660f3830c1befe8adfe2667e") 19:02:19 executing program 2: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) getpgrp(0xffffffffffffffff) 19:02:19 executing program 3: lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000006c40)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) eventfd2(0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0x0) add_key(&(0x7f0000000440)='ceph\x00', &(0x7f0000000480), &(0x7f00000004c0), 0x0, 0xffffffffffffffff) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000400), 0x0, 0x0) inotify_init1(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000240)='\x00', 0xffffffffffffffff}, 0x30) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000006c00)='systemppp0bdevvmnet1\x00'}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000008c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000001c40)='syz0\x00', 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c80)) getpgrp(0x0) gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) socket$unix(0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003200), 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003140)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006580), &(0x7f00000065c0)=0xc) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000980)="42805da0c20f460f46dc0f2e2e41d9bfef000000262edcf6208600cdc176f9cbf3f30f1a7f062900c4a1051586a920ffff0f0f99583da358580606eaf30f53cf973121e079afe0302f450f2e628a99c4c4a1ff741c3f04d6660f3830c1befe8adfe2667e") 19:02:19 executing program 5: keyctl$join(0x1, &(0x7f0000000240)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) fremovexattr(0xffffffffffffffff, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_get$uid(0x0, 0x0) 19:02:19 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x3, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") 19:02:19 executing program 0: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x406, r0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(0xffffffffffffffff, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r0, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:19 executing program 1: getegid() getegid() getresgid(&(0x7f0000000040), &(0x7f0000000180), &(0x7f00000001c0)) getegid() getgid() stat(&(0x7f0000000240)='./file1\x00', &(0x7f0000000300)) fstat(0xffffffffffffff9c, &(0x7f0000000380)) stat(&(0x7f0000000480)='./file1\x00', &(0x7f00000004c0)) syz_open_procfs(0x0, &(0x7f0000000740)='maps\x00') mknodat(0xffffffffffffffff, &(0x7f0000000780)='./file0\x00', 0x0, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000800)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:19 executing program 3: lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000006c40)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) eventfd2(0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0x0) add_key(&(0x7f0000000440)='ceph\x00', &(0x7f0000000480), &(0x7f00000004c0), 0x0, 0xffffffffffffffff) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000400), 0x0, 0x0) inotify_init1(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000240)='\x00', 0xffffffffffffffff}, 0x30) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000006c00)='systemppp0bdevvmnet1\x00'}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000008c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000001c40)='syz0\x00', 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c80)) getpgrp(0x0) gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) socket$unix(0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003200), 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003140)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006580), &(0x7f00000065c0)=0xc) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000980)="42805da0c20f460f46dc0f2e2e41d9bfef000000262edcf6208600cdc176f9cbf3f30f1a7f062900c4a1051586a920ffff0f0f99583da358580606eaf30f53cf973121e079afe0302f450f2e628a99c4c4a1ff741c3f04d6660f3830c1befe8adfe2667e") 19:02:19 executing program 3: lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000006c40)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) eventfd2(0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0x0) add_key(&(0x7f0000000440)='ceph\x00', &(0x7f0000000480), &(0x7f00000004c0), 0x0, 0xffffffffffffffff) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000400), 0x0, 0x0) inotify_init1(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000240)='\x00', 0xffffffffffffffff}, 0x30) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000006c00)='systemppp0bdevvmnet1\x00'}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000008c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000001c40)='syz0\x00', 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c80)) getpgrp(0x0) gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) socket$unix(0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003200), 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003140)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006580), &(0x7f00000065c0)=0xc) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000980)="42805da0c20f460f46dc0f2e2e41d9bfef000000262edcf6208600cdc176f9cbf3f30f1a7f062900c4a1051586a920ffff0f0f99583da358580606eaf30f53cf973121e079afe0302f450f2e628a99c4c4a1ff741c3f04d6660f3830c1befe8adfe2667e") 19:02:19 executing program 5: keyctl$join(0x1, &(0x7f0000000240)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) fremovexattr(0xffffffffffffffff, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_get$uid(0x0, 0x0) 19:02:19 executing program 3: lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000006c40)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) eventfd2(0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0x0) add_key(&(0x7f0000000440)='ceph\x00', &(0x7f0000000480), &(0x7f00000004c0), 0x0, 0xffffffffffffffff) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000400), 0x0, 0x0) inotify_init1(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000240)='\x00', 0xffffffffffffffff}, 0x30) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000006c00)='systemppp0bdevvmnet1\x00'}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000008c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000001c40)='syz0\x00', 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c80)) getpgrp(0x0) gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) socket$unix(0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003200), 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003140)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006580), &(0x7f00000065c0)=0xc) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000980)="42805da0c20f460f46dc0f2e2e41d9bfef000000262edcf6208600cdc176f9cbf3f30f1a7f062900c4a1051586a920ffff0f0f99583da358580606eaf30f53cf973121e079afe0302f450f2e628a99c4c4a1ff741c3f04d6660f3830c1befe8adfe2667e") 19:02:19 executing program 3: lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000006c40)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) eventfd2(0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0x0) add_key(&(0x7f0000000440)='ceph\x00', &(0x7f0000000480), &(0x7f00000004c0), 0x0, 0xffffffffffffffff) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000400), 0x0, 0x0) inotify_init1(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000240)='\x00', 0xffffffffffffffff}, 0x30) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000006c00)='systemppp0bdevvmnet1\x00'}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000008c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000001c40)='syz0\x00', 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c80)) getpgrp(0x0) gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) socket$unix(0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003200), 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003140)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006580), &(0x7f00000065c0)=0xc) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000980)="42805da0c20f460f46dc0f2e2e41d9bfef000000262edcf6208600cdc176f9cbf3f30f1a7f062900c4a1051586a920ffff0f0f99583da358580606eaf30f53cf973121e079afe0302f450f2e628a99c4c4a1ff741c3f04d6660f3830c1befe8adfe2667e") 19:02:19 executing program 3: lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000006c40)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) eventfd2(0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0x0) add_key(&(0x7f0000000440)='ceph\x00', &(0x7f0000000480), &(0x7f00000004c0), 0x0, 0xffffffffffffffff) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000400), 0x0, 0x0) inotify_init1(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000240)='\x00', 0xffffffffffffffff}, 0x30) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000006c00)='systemppp0bdevvmnet1\x00'}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000008c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000001c40)='syz0\x00', 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c80)) getpgrp(0x0) gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) socket$unix(0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003200), 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003140)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006580), &(0x7f00000065c0)=0xc) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000980)="42805da0c20f460f46dc0f2e2e41d9bfef000000262edcf6208600cdc176f9cbf3f30f1a7f062900c4a1051586a920ffff0f0f99583da358580606eaf30f53cf973121e079afe0302f450f2e628a99c4c4a1ff741c3f04d6660f3830c1befe8adfe2667e") 19:02:20 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x3, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") 19:02:20 executing program 2: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) getpgrp(0xffffffffffffffff) 19:02:20 executing program 3: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000580)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='net/ip6_tables_targets\x00') ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000280)={0x0, @aes128, 0x0, "42c211e96c0d5bac"}) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) keyctl$set_reqkey_keyring(0xb, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000300)='y\x00', 0xffffffffffffffff}, 0x30) ptrace(0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000001c0)="428055a03b6969ef69dc00d9fb69203737c3397c05bd060f38211a40a541ef0f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c42279929f9f") ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000240)}) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000080)=0x4) chroot(&(0x7f0000000380)='./file1\x00') syz_open_procfs(0x0, &(0x7f0000000140)='attr/fscreate\x00') write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f00000008c0)={0x7}, 0x7) 19:02:20 executing program 1: getegid() getegid() getresgid(&(0x7f0000000040), &(0x7f0000000180), &(0x7f00000001c0)) getegid() getgid() stat(&(0x7f0000000240)='./file1\x00', &(0x7f0000000300)) fstat(0xffffffffffffff9c, &(0x7f0000000380)) stat(&(0x7f0000000480)='./file1\x00', &(0x7f00000004c0)) syz_open_procfs(0x0, &(0x7f0000000740)='maps\x00') mknodat(0xffffffffffffffff, &(0x7f0000000780)='./file0\x00', 0x0, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000800)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:20 executing program 0: keyctl$join(0x1, &(0x7f0000000240)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:20 executing program 5: keyctl$join(0x1, &(0x7f0000000240)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) fremovexattr(0xffffffffffffffff, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_get$uid(0x0, 0x0) 19:02:21 executing program 0: keyctl$join(0x1, &(0x7f0000000240)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:21 executing program 5: keyctl$join(0x1, &(0x7f0000000240)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) fremovexattr(0xffffffffffffffff, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x0, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_get$uid(0x0, 0x0) 19:02:21 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x3, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") 19:02:21 executing program 1: getegid() getegid() getresgid(&(0x7f0000000040), &(0x7f0000000180), &(0x7f00000001c0)) getegid() getgid() stat(&(0x7f0000000240)='./file1\x00', &(0x7f0000000300)) fstat(0xffffffffffffff9c, &(0x7f0000000380)) stat(&(0x7f0000000480)='./file1\x00', &(0x7f00000004c0)) syz_open_procfs(0x0, &(0x7f0000000740)='maps\x00') mknodat(0xffffffffffffffff, &(0x7f0000000780)='./file0\x00', 0x0, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000800)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:21 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x3, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) 19:02:22 executing program 0: keyctl$join(0x1, &(0x7f0000000240)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:22 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x3, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") 19:02:22 executing program 2: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) getpgrp(0xffffffffffffffff) 19:02:22 executing program 5: keyctl$join(0x1, &(0x7f0000000240)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) fremovexattr(0xffffffffffffffff, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000380)={0x18}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_get$uid(0x0, 0x0) 19:02:22 executing program 1: getegid() getegid() getresgid(&(0x7f0000000040), &(0x7f0000000180), &(0x7f00000001c0)) getegid() getgid() stat(&(0x7f0000000240)='./file1\x00', &(0x7f0000000300)) fstat(0xffffffffffffff9c, &(0x7f0000000400)) stat(&(0x7f0000000480)='./file1\x00', &(0x7f00000004c0)) syz_open_procfs(0x0, &(0x7f0000000740)='maps\x00') mknodat(0xffffffffffffffff, &(0x7f0000000780)='./file0\x00', 0x0, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000800)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:22 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x3, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) 19:02:23 executing program 0: keyctl$join(0x1, &(0x7f0000000240)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:23 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x3, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") 19:02:23 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x3, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) 19:02:23 executing program 5: keyctl$join(0x1, &(0x7f0000000240)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) fremovexattr(0xffffffffffffffff, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000380)={0x18}, 0x18) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_get$uid(0x0, 0x0) 19:02:23 executing program 1: getegid() getegid() getresgid(&(0x7f0000000040), &(0x7f0000000180), &(0x7f00000001c0)) getegid() getgid() stat(&(0x7f0000000240)='./file1\x00', &(0x7f0000000300)) fstat(0xffffffffffffff9c, &(0x7f0000000400)) stat(&(0x7f0000000480)='./file1\x00', &(0x7f00000004c0)) syz_open_procfs(0x0, &(0x7f0000000740)='maps\x00') mknodat(0xffffffffffffffff, &(0x7f0000000780)='./file0\x00', 0x0, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000800)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:23 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x3, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") 19:02:24 executing program 0: keyctl$join(0x1, &(0x7f0000000240)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:24 executing program 3: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:24 executing program 2: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) getpgrp(0xffffffffffffffff) 19:02:24 executing program 5: keyctl$join(0x1, &(0x7f0000000240)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) fremovexattr(0xffffffffffffffff, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000380)={0x18}, 0x18) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_get$uid(0x0, 0x0) 19:02:24 executing program 1: getegid() getegid() getresgid(&(0x7f0000000040), &(0x7f0000000180), &(0x7f00000001c0)) getegid() getgid() stat(&(0x7f0000000240)='./file1\x00', &(0x7f0000000300)) fstat(0xffffffffffffff9c, &(0x7f0000000400)) stat(&(0x7f0000000480)='./file1\x00', &(0x7f00000004c0)) syz_open_procfs(0x0, &(0x7f0000000740)='maps\x00') mknodat(0xffffffffffffffff, &(0x7f0000000780)='./file0\x00', 0x0, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000800)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:24 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x3, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") 19:02:25 executing program 0: keyctl$join(0x1, &(0x7f0000000240)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) fremovexattr(0xffffffffffffffff, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:25 executing program 3: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:25 executing program 5: keyctl$join(0x1, &(0x7f0000000240)) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) fremovexattr(0xffffffffffffffff, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000380)={0x18}, 0x18) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_get$uid(0x0, 0x0) 19:02:25 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x3, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") 19:02:25 executing program 1: getegid() getegid() getresgid(&(0x7f0000000040), &(0x7f0000000180), &(0x7f00000001c0)) getegid() getgid() fstat(0xffffffffffffff9c, &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f0000000400)) stat(&(0x7f0000000480)='./file1\x00', &(0x7f00000004c0)) syz_open_procfs(0x0, &(0x7f0000000740)='maps\x00') mknodat(0xffffffffffffffff, &(0x7f0000000780)='./file0\x00', 0x0, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000800)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:25 executing program 0: keyctl$join(0x1, &(0x7f0000000240)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) fremovexattr(0xffffffffffffffff, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:25 executing program 3: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:25 executing program 0: keyctl$join(0x1, &(0x7f0000000240)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) fremovexattr(0xffffffffffffffff, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:26 executing program 2: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) getpgrp(0xffffffffffffffff) 19:02:26 executing program 0: keyctl$join(0x1, &(0x7f0000000240)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) fremovexattr(0xffffffffffffffff, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:26 executing program 5: keyctl$join(0x1, &(0x7f0000000240)) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) fremovexattr(0xffffffffffffffff, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000380)={0x18}, 0x18) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_get$uid(0x0, 0x0) 19:02:26 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x3, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") 19:02:26 executing program 0: keyctl$join(0x1, &(0x7f0000000240)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) fremovexattr(0xffffffffffffffff, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:26 executing program 0: keyctl$join(0x1, &(0x7f0000000240)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) fremovexattr(0xffffffffffffffff, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:26 executing program 0: keyctl$join(0x1, &(0x7f0000000240)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) fremovexattr(0xffffffffffffffff, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:26 executing program 1: getegid() getegid() getresgid(&(0x7f0000000040), &(0x7f0000000180), &(0x7f00000001c0)) getegid() getgid() fstat(0xffffffffffffff9c, &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f0000000400)) stat(&(0x7f0000000480)='./file1\x00', &(0x7f00000004c0)) syz_open_procfs(0x0, &(0x7f0000000740)='maps\x00') mknodat(0xffffffffffffffff, &(0x7f0000000780)='./file0\x00', 0x0, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000800)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:26 executing program 0: keyctl$join(0x1, &(0x7f0000000240)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) fremovexattr(0xffffffffffffffff, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:26 executing program 0: keyctl$join(0x1, &(0x7f0000000240)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) fremovexattr(0xffffffffffffffff, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:26 executing program 3: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) 19:02:26 executing program 0: keyctl$join(0x1, &(0x7f0000000240)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) fremovexattr(0xffffffffffffffff, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:27 executing program 2: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) getpgrp(0xffffffffffffffff) 19:02:27 executing program 0: keyctl$join(0x1, &(0x7f0000000240)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) fremovexattr(0xffffffffffffffff, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:27 executing program 3: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) 19:02:27 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x3, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") 19:02:27 executing program 5: keyctl$join(0x1, &(0x7f0000000240)) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) fremovexattr(0xffffffffffffffff, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000380)={0x18}, 0x18) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev, 0x0, 0x0, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_get$uid(0x0, 0x0) 19:02:27 executing program 0: keyctl$join(0x1, &(0x7f0000000240)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) fremovexattr(0xffffffffffffffff, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:27 executing program 3: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) 19:02:27 executing program 1: getegid() getegid() getresgid(&(0x7f0000000040), &(0x7f0000000180), &(0x7f00000001c0)) getegid() getgid() fstat(0xffffffffffffff9c, &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f0000000400)) stat(&(0x7f0000000480)='./file1\x00', &(0x7f00000004c0)) syz_open_procfs(0x0, &(0x7f0000000740)='maps\x00') mknodat(0xffffffffffffffff, &(0x7f0000000780)='./file0\x00', 0x0, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000800)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:27 executing program 3: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:27 executing program 0: keyctl$join(0x1, &(0x7f0000000240)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) fremovexattr(0xffffffffffffffff, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:27 executing program 0: keyctl$join(0x1, &(0x7f0000000240)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) fremovexattr(0xffffffffffffffff, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:28 executing program 5: keyctl$join(0x1, &(0x7f0000000240)) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) fremovexattr(0xffffffffffffffff, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000380)={0x18}, 0x18) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev, 0x0, 0x0, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_get$uid(0x0, 0x0) 19:02:28 executing program 2: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) getpgrp(0xffffffffffffffff) 19:02:28 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x3, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") 19:02:28 executing program 3: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:28 executing program 1: getegid() getegid() getresgid(&(0x7f0000000040), &(0x7f0000000180), &(0x7f00000001c0)) getegid() stat(&(0x7f0000000240)='./file1\x00', &(0x7f0000000300)) fstat(0xffffffffffffff9c, &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f0000000400)) stat(&(0x7f0000000480)='./file1\x00', &(0x7f00000004c0)) syz_open_procfs(0x0, &(0x7f0000000740)='maps\x00') mknodat(0xffffffffffffffff, &(0x7f0000000780)='./file0\x00', 0x0, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000800)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:28 executing program 0: keyctl$join(0x1, &(0x7f0000000240)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) fremovexattr(0xffffffffffffffff, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:28 executing program 5: keyctl$join(0x1, &(0x7f0000000240)) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) fremovexattr(0xffffffffffffffff, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000380)={0x18}, 0x18) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev, 0x0, 0x0, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {}, 0x0, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_get$uid(0x0, 0x0) 19:02:29 executing program 3: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:29 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x3, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") 19:02:29 executing program 0: keyctl$join(0x1, &(0x7f0000000240)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) fremovexattr(0xffffffffffffffff, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x0, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:29 executing program 1: getegid() getegid() getresgid(&(0x7f0000000040), &(0x7f0000000180), &(0x7f00000001c0)) getegid() stat(&(0x7f0000000240)='./file1\x00', &(0x7f0000000300)) fstat(0xffffffffffffff9c, &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f0000000400)) stat(&(0x7f0000000480)='./file1\x00', &(0x7f00000004c0)) syz_open_procfs(0x0, &(0x7f0000000740)='maps\x00') mknodat(0xffffffffffffffff, &(0x7f0000000780)='./file0\x00', 0x0, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000800)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:29 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x3, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") 19:02:29 executing program 5: keyctl$join(0x1, &(0x7f0000000240)) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) fremovexattr(0xffffffffffffffff, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000380)={0x18}, 0x18) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev, 0x0, 0x0, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {}, 0x0, 0x0, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_get$uid(0x0, 0x0) 19:02:30 executing program 2: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) getpgrp(0xffffffffffffffff) 19:02:30 executing program 3: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:30 executing program 0: keyctl$join(0x1, &(0x7f0000000240)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) fremovexattr(0xffffffffffffffff, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000380)={0x18}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:30 executing program 1: getegid() getegid() getresgid(&(0x7f0000000040), &(0x7f0000000180), &(0x7f00000001c0)) getegid() stat(&(0x7f0000000240)='./file1\x00', &(0x7f0000000300)) fstat(0xffffffffffffff9c, &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f0000000400)) stat(&(0x7f0000000480)='./file1\x00', &(0x7f00000004c0)) syz_open_procfs(0x0, &(0x7f0000000740)='maps\x00') mknodat(0xffffffffffffffff, &(0x7f0000000780)='./file0\x00', 0x0, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000800)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:30 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x3, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") 19:02:30 executing program 5: keyctl$join(0x1, &(0x7f0000000240)) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) fremovexattr(0xffffffffffffffff, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000380)={0x18}, 0x18) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev, 0x0, 0x0, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {}, 0x0, 0x0, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_get$uid(0x0, 0x0) 19:02:31 executing program 3: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:31 executing program 0: keyctl$join(0x1, &(0x7f0000000240)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) fremovexattr(0xffffffffffffffff, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000380)={0x18}, 0x18) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:31 executing program 1: getegid() getegid() getresgid(&(0x7f0000000040), &(0x7f0000000180), &(0x7f00000001c0)) getgid() stat(&(0x7f0000000240)='./file1\x00', &(0x7f0000000300)) fstat(0xffffffffffffff9c, &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f0000000400)) stat(&(0x7f0000000480)='./file1\x00', &(0x7f00000004c0)) syz_open_procfs(0x0, &(0x7f0000000740)='maps\x00') mknodat(0xffffffffffffffff, &(0x7f0000000780)='./file0\x00', 0x0, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000800)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:31 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x3, 0x0, 0x0) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") 19:02:31 executing program 5: keyctl$join(0x1, &(0x7f0000000240)) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) fremovexattr(0xffffffffffffffff, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000380)={0x18}, 0x18) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev, 0x0, 0x0, 'veth0_to_bridge\x00', 'bond_slave_1\x00'}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_get$uid(0x0, 0x0) 19:02:31 executing program 3: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:32 executing program 2: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a40)) gettid() getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003600)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003640), &(0x7f0000003680)=0xc) getpgrp(0xffffffffffffffff) 19:02:32 executing program 0: keyctl$join(0x1, &(0x7f0000000240)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) fremovexattr(0xffffffffffffffff, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000380)={0x18}, 0x18) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 19:02:32 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x3, 0x0, 0x0) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") 19:02:32 executing program 1: getegid() getegid() getresgid(&(0x7f0000000040), &(0x7f0000000180), &(0x7f00000001c0)) getgid() stat(&(0x7f0000000240)='./file1\x00', &(0x7f0000000300)) fstat(0xffffffffffffff9c, &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f0000000400)) stat(&(0x7f0000000480)='./file1\x00', &(0x7f00000004c0)) syz_open_procfs(0x0, &(0x7f0000000740)='maps\x00') mknodat(0xffffffffffffffff, &(0x7f0000000780)='./file0\x00', 0x0, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000800)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") [ 859.317410] INFO: task syz-executor3:14726 blocked for more than 140 seconds. [ 859.325026] Not tainted 4.9.127+ #91 [ 859.344137] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. 19:02:32 executing program 5: keyctl$join(0x1, &(0x7f0000000240)) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) fremovexattr(0xffffffffffffffff, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000380)={0x18}, 0x18) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x578, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev, 0x0, 0x0, 'veth0_to_bridge\x00', 'bond_slave_1\x00'}, 0x0, 0xc0, 0xe8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5d8) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_get$uid(0x0, 0x0) [ 859.373217] syz-executor3 D29608 14726 14690 0x00000000 [ 859.400065] ffff8801d6804740 ffff8801cfa5c200 ffff88008bfe6880 ffff8801d17cdf00 [ 859.430786] ffff8801db621018 ffff88008ac27850 ffffffff8277dc12 ffff8801d6804fe8 [ 859.458159] ffffffff83ad7f00 ffff8801db621018 0000000000000413 ffff8801db6218f0 [ 859.486943] Call Trace: [ 859.497386] [] ? __schedule+0x662/0x1b10 [ 859.516732] [] schedule+0x7f/0x1b0 [ 859.529245] [] schedule_timeout+0x735/0xe20 [ 859.543393] [] ? usleep_range+0x140/0x140 [ 859.557289] [] ? mark_wake_futex+0x120/0x120 [ 859.574543] [] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 859.598433] [] ? mark_held_locks+0xc7/0x130 [ 859.620274] [] ? _raw_spin_unlock_irq+0x27/0x50 [ 859.642590] [] ? trace_hardirqs_on_caller+0x38b/0x590 [ 859.667263] [] __ldsem_down_read_nested+0x2c4/0x4f0 [ 859.692401] [] ? ldsem_down_read+0x32/0x40 [ 859.713486] [] ? __ldsem_wake+0x330/0x330 [ 859.733876] [] ldsem_down_read+0x32/0x40 19:02:32 executing program 3: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") [ 859.756571] [] tty_ldisc_ref_wait+0x25/0x80 [ 859.778176] [] tty_ioctl+0x3b6/0x2190 [ 859.798268] [] ? no_tty+0xa0/0xa0 [ 859.825219] [] ? avc_ss_reset+0x110/0x110 [ 859.846192] [] ? do_futex+0x175/0x1840 [ 859.874218] [] ? do_readv_writev+0x377/0x7b0 19:02:32 executing program 0: keyctl$join(0x1, &(0x7f0000000240)) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) fremovexattr(0xffffffffffffffff, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000380)={0x18}, 0x18) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev={0xac, 0x14, 0x14, 0x1d}, 0x0, 0xff000000, 'veth0_to_bridge\x00', 'bond_slave_1\x00', {}, {0xff}, 0x67, 0x1, 0x20}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x600) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") [ 859.903985] [] ? __lock_acquire+0x654/0x4a10 [ 859.931369] [] ? exit_robust_list+0x220/0x220 [ 859.959735] [] ? vfs_write+0x520/0x520 [ 859.984321] [] ? __might_sleep+0x95/0x1a0 [ 860.007268] [] ? no_tty+0xa0/0xa0 19:02:32 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_set$uid(0x3, 0x0, 0x0) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") [ 860.031324] [] do_vfs_ioctl+0x1ac/0x11a0 [ 860.052616] [] ? ioctl_preallocate+0x220/0x220 19:02:33 executing program 1: getegid() getegid() getresgid(&(0x7f0000000040), &(0x7f0000000180), &(0x7f00000001c0)) getgid() stat(&(0x7f0000000240)='./file1\x00', &(0x7f0000000300)) fstat(0xffffffffffffff9c, &(0x7f0000000380)) fstat(0xffffffffffffff9c, &(0x7f0000000400)) stat(&(0x7f0000000480)='./file1\x00', &(0x7f00000004c0)) syz_open_procfs(0x0, &(0x7f0000000740)='maps\x00') mknodat(0xffffffffffffffff, &(0x7f0000000780)='./file0\x00', 0x0, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000800)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") [ 860.076702] [] ? selinux_parse_skb.constprop.42+0x1a90/0x1a90 [ 860.101234] [] ? check_preemption_disabled+0x3b/0x170 [ 860.124325] [] ? __fget+0x214/0x3d0 [ 860.149325] [] ? __fget+0x23b/0x3d0 [ 860.170443] [] ? __fget+0x47/0x3d0 [ 860.192414] [] ? security_file_ioctl+0x8f/0xc0 [ 860.232449] [] SyS_ioctl+0x8f/0xc0 [ 860.240315] [] ? do_vfs_ioctl+0x11a0/0x11a0 [ 860.270167] [] do_syscall_64+0x19f/0x480 [ 860.290998] [] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 860.316082] [ 860.316082] Showing all locks held in the system: [ 860.339523] 2 locks held by khungtaskd/24: [ 860.343809] #0: (rcu_read_lock){......}, at: [] watchdog+0x11c/0xa20 [ 860.352643] #1: (tasklist_lock){.+.+..}, at: [] debug_show_all_locks+0x79/0x218 [ 860.362402] 2 locks held by getty/2033: [ 860.366364] #0: (&tty->ldisc_sem){++++++}, at: [] ldsem_down_read+0x32/0x40 [ 860.375716] #1: (&ldata->atomic_read_lock){+.+...}, at: [] n_tty_read+0x202/0x16e0 [ 860.385727] 2 locks held by syz-executor3/14683: [ 860.390505] #0: (&tty->ldisc_sem){++++++}, at: [] ldsem_down_read+0x32/0x40 [ 860.399875] #1: (&ldata->atomic_read_lock){+.+...}, at: [] n_tty_read+0x202/0x16e0 [ 860.409873] 1 lock held by syz-executor3/14726: 19:02:33 executing program 5: keyctl$join(0x1, &(0x7f0000000240)) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) fremovexattr(0xffffffffffffffff, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000380)={0x18}, 0x18) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x550, 0x2f0, 0x0, 0x3f8, 0x0, 0xc8, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000600), {[{{@ip={@remote, @dev={0xac, 0x14, 0x14, 0xf}, 0xffffffff, 0xffffffff, 'bcsh0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x1d, 0x1, 0x40}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x66fa6d91, 0x91, @empty, 0x4e22}}}, {{@uncond, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xffffffff00000001, 0xffffffffffff8031, @empty, 0x4e23}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x33}}}, {{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x66f, [0x3, 0x1fc00000000000, 0x1c51, 0x5, 0x2, 0x7fffffff], 0x6, 0x0, 0x3ff}}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0xfff, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e23}}}, {{@ip={@remote, @dev, 0x0, 0x0, 'veth0_to_bridge\x00', 'bond_slave_1\x00'}, 0x0, 0x98, 0xc0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5b0) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioprio_get$uid(0x0, 0x0) [ 860.414525] #0: (&tty->ldisc_sem){++++++}, at: [] ldsem_down_read+0x32/0x40 [ 860.423897] 2 locks held by syz-executor0/14807: [ 860.428650] #0: (&tty->ldisc_sem){++++++}, at: [] ldsem_down_read+0x32/0x40 [ 860.438033] #1: (&ldata->atomic_read_lock){+.+...}, at: [] n_tty_read+0x202/0x16e0 [ 860.448011] [ 860.449624] ============================================= [ 860.449624] [ 860.460773] NMI backtrace for cpu 1 [ 860.464422] CPU: 1 PID: 24 Comm: khungtaskd Not tainted 4.9.127+ #91 [ 860.470900] ffff8801d9907d08 ffffffff81af11e9 0000000000000000 0000000000000001 [ 860.478955] 0000000000000001 0000000000000001 ffffffff810967d0 ffff8801d9907d40 [ 860.486996] ffffffff81afbf49 0000000000000001 0000000000000000 0000000000000003 [ 860.495055] Call Trace: [ 860.497635] [] dump_stack+0xc1/0x128 [ 860.502989] [] ? irq_force_complete_move+0x330/0x330 [ 860.509739] [] nmi_cpu_backtrace.cold.0+0x48/0x87 [ 860.516224] [] ? irq_force_complete_move+0x330/0x330 [ 860.522963] [] nmi_trigger_cpumask_backtrace+0x12c/0x151 [ 860.530055] [] arch_trigger_cpumask_backtrace+0x14/0x20 [ 860.537057] [] watchdog+0x6ad/0xa20 [ 860.542320] [] ? watchdog+0x11c/0xa20 [ 860.547769] [] kthread+0x26d/0x300 [ 860.552950] [] ? reset_hung_task_detector+0x20/0x20 [ 860.559607] [] ? kthread_park+0xa0/0xa0 [ 860.565221] [] ? __switch_to_asm+0x34/0x70 [ 860.571094] [] ? kthread_park+0xa0/0xa0 [ 860.576701] [] ? kthread_park+0xa0/0xa0 [ 860.582313] [] ret_from_fork+0x5c/0x70 [ 860.587925] Sending NMI from CPU 1 to CPUs 0: [ 860.592492] NMI backtrace for cpu 0 [ 860.596120] CPU: 0 PID: 20624 Comm: syz-executor0 Not tainted 4.9.127+ #91 [ 860.603123] task: ffff880089fa2f80 task.stack: ffff880089ee8000 [ 860.609162] RIP: 0033:[<00000000004023c4>] c [<00000000004023c4>] 0x4023c4 [ 860.616240] RSP: 002b:00007fe2d168e690 EFLAGS: 00000206 [ 860.621667] RAX: 0000000002053487 RBX: 000000000000000b RCX: 00000000004572d9 [ 860.628919] RDX: 00000000a05d8042 RSI: 00007fe2d168e6c0 RDI: 000000000000000b [ 860.636174] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 860.643428] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 860.650683] R13: 00000000004d7350 R14: 00000000004ca40d R15: 0000000000000000 [ 860.657936] FS: 00007fe2d168f700(0000) GS:ffff8801db600000(0000) knlGS:0000000000000000 [ 860.666147] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 19:02:33 executing program 3: keyctl$join(0x1, &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x8}) fremovexattr(r0, &(0x7f0000000580)=@random={'system.', '\x00'}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) write$FUSE_GETXATTR(r1, &(0x7f0000000380)={0x18, 0x0, 0x6, {0xe6d}}, 0x18) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") [ 860.672020] CR2: 0000000000a3fdc8 CR3: 00000001c7181000 CR4: 00000000001606b0 19:02:33 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200), 0x4) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) setfsuid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000c80)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") [ 861.083078] Kernel panic - not syncing: hung_task: blocked tasks [ 861.089279] CPU: 1 PID: 24 Comm: khungtaskd Not tainted 4.9.127+ #91 [ 861.095757] ffff8801d9907cc8 ffffffff81af11e9 ffffffff82878340 00000000ffffffff [ 861.103801] 0000000000000000 0000000000000001 dffffc0000000000 ffff8801d9907d88 [ 861.111830] ffffffff813df675 0000000041b58ab3 ffffffff82c287e3 ffffffff813df4b6 [ 861.119884] Call Trace: [ 861.122481] [] dump_stack+0xc1/0x128 [ 861.127853] [] panic+0x1bf/0x39f [ 861.132878] [] ? add_taint.cold.6+0x16/0x16 [ 861.138836] [] ? ___preempt_schedule+0x16/0x18 [ 861.145060] [] ? nmi_trigger_cpumask_backtrace+0x102/0x151 [ 861.152328] [] watchdog+0x6be/0xa20 [ 861.157618] [] ? watchdog+0x11c/0xa20 [ 861.163075] [] kthread+0x26d/0x300 [ 861.168290] [] ? reset_hung_task_detector+0x20/0x20 [ 861.175320] [] ? kthread_park+0xa0/0xa0 [ 861.180932] [] ? __switch_to_asm+0x34/0x70 [ 861.186803] [] ? kthread_park+0xa0/0xa0 [ 861.192430] [] ? kthread_park+0xa0/0xa0 [ 861.198047] [] ret_from_fork+0x5c/0x70 [ 861.203867] Kernel Offset: disabled [ 861.207492] Rebooting in 86400 seconds..